Sciweavers

490 search results - page 92 / 98
» A New Public-Key Cryptosystem
Sort
View
SACRYPT
2004
Springer
143views Cryptology» more  SACRYPT 2004»
15 years 9 months ago
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
Abstract. This paper formalizes the security adversarial games for online symmetric cryptosystems in a unified framework for deterministic and probabilistic encryption schemes. On...
Pierre-Alain Fouque, Antoine Joux, Guillaume Poupa...
161
Voted
PKC
2010
Springer
234views Cryptology» more  PKC 2010»
15 years 5 months ago
Solving a 676-Bit Discrete Logarithm Problem in GF(36n)
Abstract. Pairings on elliptic curves over finite fields are crucial for constructing various cryptographic schemes. The T pairing on supersingular curves over GF(3n ) is particula...
Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shi...
137
Voted
IJNSEC
2007
147views more  IJNSEC 2007»
15 years 3 months ago
A Genetic Algorithm for Cryptanalysis of DES-8
Various cryptosystems exploit exhaustive techniques to search, missing-the-mark, key space. Such search techniques should be guided in order to be computationally adequate. Here, ...
Hasan Mohammed Hasan Husein, Bayoumi I. Bayoumi, F...
135
Voted
DCC
2001
IEEE
16 years 3 months ago
Cryptography in Quadratic Function Fields
We describe several cryptographic schemes in quadratic function fields of odd characteristic. In both the real and the imaginary representation of such a field, we present a Diffi...
Renate Scheidler
112
Voted
WISTP
2009
Springer
15 years 10 months ago
On Second-Order Fault Analysis Resistance for CRT-RSA Implementations
Since their publication in 1996, Fault Attacks have been widely studied from both theoretical and practical points of view and most of cryptographic systems have been shown vulnera...
Emmanuelle Dottax, Christophe Giraud, Matthieu Riv...