Sciweavers

704 search results - page 19 / 141
» A Practical Attack on KeeLoq
Sort
View
LATINCRYPT
2010
13 years 8 months ago
How Leaky Is an Extractor?
This paper discusses the security of a leakage-resilient stream cipher presented at FOCS 2008, instantiated in a practical setting. Based on a case study, we put forward implementa...
François-Xavier Standaert
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
14 years 10 months ago
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
MULTI2 is the block cipher used in the ISDB standard for scrambling digital multimedia content. MULTI2 is used in Japan to secure multimedia broadcasting, including recent applicat...
Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan...
FSE
2000
Springer
80views Cryptology» more  FSE 2000»
14 years 1 months ago
Stochastic Cryptanalysis of Crypton
Abstract. Crypton is a 12-round blockcipher proposed as an AES candidate by C.H. Lim in 1998. In this paper, we show how to exploit some statistical deficiencies of the Crypton rou...
Marine Minier, Henri Gilbert
ASIACRYPT
2011
Springer
12 years 9 months ago
Biclique Cryptanalysis of the Full AES
Since Rijndael was chosen as the Advanced Encryption Standard, improving upon 7-round attacks on the 128-bit key variant or upon 8-round attacks on the 192/256-bit key variants has...
Andrey Bogdanov, Dmitry Khovratovich, Christian Re...
ICAIL
2005
ACM
14 years 3 months ago
Arguing about cases as practical reasoning
In this paper we apply a general account of practical reasoning to arguing about legal cases. In particular, we describe how the reasoning in one very well known property law case...
Katie Atkinson, Trevor J. M. Bench-Capon, Peter Mc...