Sciweavers

264 search results - page 43 / 53
» Algebraic Side-Channel Attacks
Sort
View
SIVP
2010
197views more  SIVP 2010»
13 years 5 months ago
Video watermarking using wavelet transform and tensor algebra
We present a robust, hybrid non-blind MPEG video watermarking technique based on a high-order tensor singular value decomposition and the discrete wavelet transform (DWT). The core...
Emad E. Abdallah, A. Ben Hamza, Prabir Bhattachary...
CTRSA
2008
Springer
160views Cryptology» more  CTRSA 2008»
13 years 9 months ago
Fault Analysis Study of IDEA
We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher's specific property to employ ...
Christophe Clavier, Benedikt Gierlichs, Ingrid Ver...
IACR
2011
135views more  IACR 2011»
12 years 7 months ago
Algebraic Complexity Reduction and Cryptanalysis of GOST
Abstract. GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. Its large key size of 256 bits at a particularly low implementa...
Nicolas Courtois
IACR
2011
127views more  IACR 2011»
12 years 7 months ago
Corrigendum to: The Cube Attack on Stream Cipher Trivium and Quadraticity Tests
In 2008 I. Dinur and A. Shamir presented a new type of algebraic attack on symmetric ciphers named cube attack. The method has been applied to reduced variants of stream ciphers T...
Piotr Mroczkowski, Janusz Szmidt
FCT
2003
Springer
14 years 21 days ago
Context-Sensitive Equivalences for Non-interference Based Protocol Analysis
We develop new proof techniques, based on non-interference, for the analysis of safety and liveness properties of cryptographic protocols expressed as terms of the process algebra ...
Michele Bugliesi, Ambra Ceccato, Sabina Rossi