Sciweavers

362 search results - page 16 / 73
» Abstraction in Cryptography
Sort
View
CHES
2004
Springer
230views Cryptology» more  CHES 2004»
14 years 27 days ago
Correlation Power Analysis with a Leakage Model
Abstract. A classical model is used for the power consumption of cryptographic devices. It is based on the Hamming distance of the data handled with regard to an unknown but consta...
Eric Brier, Christophe Clavier, Francis Olivier
TCC
2004
Springer
835views Cryptology» more  TCC 2004»
14 years 25 days ago
On the Possibility of One-Message Weak Zero-Knowledge
Abstract. We investigate whether it is possible to obtain any meaningful type of zero-knowledge proofs using a one-message (i.e., noninteractive) proof system. We show that, under ...
Boaz Barak, Rafael Pass
FSE
2003
Springer
152views Cryptology» more  FSE 2003»
14 years 21 days ago
Block Ciphers and Systems of Quadratic Equations
Abstract. In this paper we compare systems of multivariate polynomials, which completely define the block ciphers Khazad, Misty1, Kasumi, Camellia, Rijndael and Serpent in the vie...
Alex Biryukov, Christophe De Cannière
FSE
2003
Springer
110views Cryptology» more  FSE 2003»
14 years 21 days ago
Loosening the KNOT
Abstract. In this paper, we present differential attacks on the selfsynchronizing stream cipher KNOT. Our best attack recovers 96 bits of the secret key with time complexity of 26...
Antoine Joux, Frédéric Muller
MPC
2010
Springer
157views Mathematics» more  MPC 2010»
14 years 8 days ago
The Logic of Large Enough
Abstract. In this paper we explore the “for large enough” quantifier, also known as “all but finitely many”, which plays a central role in asymptotic reasoning, as used f...
Eerke A. Boiten, Dan Grundy