Sciweavers

38 search results - page 4 / 8
» A Statistical Saturation Attack against the Block Cipher PRE...
Sort
View
CHES
2005
Springer
123views Cryptology» more  CHES 2005»
14 years 1 months ago
Improved Higher-Order Side-Channel Attacks with FPGA Experiments
We demonstrate that masking a block cipher implementation does not sufficiently improve its security against side-channel attacks. Under exactly the same hypotheses as in a Differ...
Eric Peeters, François-Xavier Standaert, Ni...
CISC
2009
Springer
181views Cryptology» more  CISC 2009»
13 years 5 months ago
Cryptanalysis of the ESSENCE Family of Hash Functions
Abstract. ESSENCE is a family of cryptographic hash functions, accepted to the first round of NIST's SHA-3 competition. This paper presents the first known attacks on ESSENCE....
Nicky Mouha, Gautham Sekar, Jean-Philippe Aumasson...
CHES
2003
Springer
145views Cryptology» more  CHES 2003»
14 years 24 days ago
Cryptanalysis of DES Implemented on Computers with Cache
This paper presents the results of applying an attack against the Data Encryption Standard (DES) implemented in some applications, using side-channel information based on CPU delay...
Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Mak...
FSE
1997
Springer
104views Cryptology» more  FSE 1997»
13 years 11 months ago
The Block Cipher Square
In this paper we present a new 128-bit block cipher called Square. The original design of Square concentrates on the resistance against di erential and linear cryptanalysis. Howeve...
Joan Daemen, Lars R. Knudsen, Vincent Rijmen
ASIACRYPT
2008
Springer
13 years 9 months ago
An Improved Impossible Differential Attack on MISTY1
MISTY1 is a Feistel block cipher that received a great deal of cryptographic attention. Its recursive structure, as well as the added FL layers, have been successful in thwarting v...
Orr Dunkelman, Nathan Keller