Sciweavers

476 search results - page 25 / 96
» A New Attack against Khazad
Sort
View
USS
2008
14 years 5 days ago
Research Challenges for the Security of Control Systems
In this paper we attempt to answer two questions: (1) Why should we be interested in the security of control systems? And (2) What are the new and fundamentally different requirem...
Alvaro A. Cárdenas, Saurabh Amin, Shankar S...
EUROCRYPT
1994
Springer
14 years 1 months ago
The Self-Shrinking Generator
The self-shrinking generator was introduced in 1994. It is based on the idea behind the shrinking generator and despite its simplicity it has remained remarkably resistant to effic...
Willi Meier, Othmar Staffelbach
CHES
2007
Springer
173views Cryptology» more  CHES 2007»
14 years 4 months ago
Collision Attacks on AES-Based MAC: Alpha-MAC
Message Authentication Code construction Alred and its AES-based instance Alpha-MAC were introduced by Daemen and Rijmen in 2005. We show that under certain assumptions about its i...
Alex Biryukov, Andrey Bogdanov, Dmitry Khovratovic...
ITCC
2002
IEEE
14 years 2 months ago
Enhancing Watermark Robustness through Mixture of Watermarked Digital Objects
After the failure of copy prevention methods, watermarking stays the main technical safeguard of electronic copyright. There are many properties that a watermarking scheme should ...
Josep Domingo-Ferrer, Francesc Sebé
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 10 months ago
Doubly Perfect Nonlinear Boolean Permutations
Due to implementation constraints the XOR operation is widely used in order to combine plaintext and key bit-strings in secretkey block ciphers. This choice directly induces the cl...
Laurent Poinsot