Sciweavers

54 search results - page 4 / 11
» Backtracking Algorithmic Complexity Attacks against a NIDS
Sort
View
ICISC
2008
146views Cryptology» more  ICISC 2008»
13 years 9 months ago
A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent
Abstract. In this paper, we present a new technique for Matsui's algorithm 2 using multidimensional linear approximation. We show that the data complexity of the attack can be...
Joo Yeon Cho, Miia Hermelin, Kaisa Nyberg
FSE
2007
Springer
111views Cryptology» more  FSE 2007»
14 years 1 months ago
An Analysis of XSL Applied to BES
Abstract. Currently, the only plausible attack on the Advanced Encryption System (AES) is the XSL attack over F256 through the Big Encryption System (BES) embedding. In this paper,...
Chu-Wee Lim, Khoongming Khoo
CRYPTO
2004
Springer
86views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
On Multiple Linear Approximations
In this paper we study the long standing problem of information extraction from multiple linear approximations. We develop a formal statistical framework for block cipher attacks b...
Alex Biryukov, Christophe De Cannière, Mich...
ICRA
2007
IEEE
205views Robotics» more  ICRA 2007»
14 years 2 months ago
Marker-less Human Motion Estimation using Articulated Deformable Model
— This paper presents a novel whole body motion estimation method by fitting a deformable articulated model of the human body into the 3D reconstructed volume obtained from mult...
Koichi Ogawara, Xiaolu Li, Katsushi Ikeuchi
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
14 years 1 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi