Sciweavers

427 search results - page 17 / 86
» Cryptanalysis of the
Sort
View
COMCOM
2004
83views more  COMCOM 2004»
13 years 7 months ago
Breaking network security based on synchronized chaos
Very recently, the use of chaos synchronization as a means of masking information data in a network has been proposed. Although it is claimed that the security breach is not possi...
Gonzalo Álvarez, Shujun Li
JOC
1998
117views more  JOC 1998»
13 years 7 months ago
An Analysis of SAFER
We investigate some of the algebraic properties of the SAFER block cipher when the message space is considered as a Z-module. In particular we consider the invariant Z-submodules ...
Sean Murphy
TDSC
2011
13 years 2 months ago
On the Security of Chien's Ultralightweight RFID Authentication Protocol
Recently, Chien proposed an ultralightweight RFID authentication protocol to prevent all possible attacks. However, we find two de-synchronization attacks to break the protocol. K...
Hung-Min Sun, Wei-Chih Ting, King-Hang Wang
IJNSEC
2010
138views more  IJNSEC 2010»
13 years 2 months ago
A Modified Hill Cipher Involving Interweaving and Iteration
This paper deals with a modification of the Hill cipher. In this, we have introduced interweaving in each step of the iteration. The interweaving of the resulting plaintext, at ea...
V. Umakanta Sastry, N. Ravi Shankar, S. Durga Bhav...
DAC
2001
ACM
14 years 8 months ago
Concurrent Error Detection of Fault-Based Side-Channel Cryptanalysis of 128-Bit Symmetric Block Ciphers
: Fault-based side channel cryptanalysis is very effective against symmetric and asymmetric encryption algorithms. Although straightforward hardware and time redundancy based concu...
Ramesh Karri, Kaijie Wu, Piyush Mishra, Yongkook K...