Sciweavers

264 search results - page 35 / 53
» Algebraic Side-Channel Attacks
Sort
View
JCSS
2008
159views more  JCSS 2008»
13 years 7 months ago
Analysing distributed Internet worm attacks using continuous state-space approximation of process algebra models
Internet worms are classically described using SIR models and simulations, to capture the massive dynamics of the system. Here we are able to generate a differential equation-base...
Jeremy T. Bradley, Stephen T. Gilmore, Jane Hillst...
CANS
2009
Springer
194views Cryptology» more  CANS 2009»
14 years 2 months ago
Algebraic Attack on the MQQ Public Key Cryptosystem
Abstract. In this paper, we present an efficient attack on the multivariate Quadratic Quasigroups (MQQ) public key cryptosystem. Our cryptanalysis breaks the MQQ cryptosystem by so...
Mohamed Saied Emam Mohamed, Jintai Ding, Johannes ...
CTRSA
2005
Springer
108views Cryptology» more  CTRSA 2005»
14 years 1 months ago
Resistance of SNOW 2.0 Against Algebraic Attacks
SNOW 2.0, a software oriented stream cipher proposed by T. Johansson and P. Ekdahl in 2002 as an enhanced version of the
Olivier Billet, Henri Gilbert
EUROCRYPT
2004
Springer
14 years 28 days ago
Algebraic Attacks and Decomposition of Boolean Functions
Willi Meier, Enes Pasalic, Claude Carlet
FSE
2004
Springer
94views Cryptology» more  FSE 2004»
14 years 28 days ago
Improving Fast Algebraic Attacks
Frederik Armknecht