Sciweavers

427 search results - page 76 / 86
» Cryptanalysis of the
Sort
View
PDCAT
2004
Springer
14 years 1 months ago
GridCrypt: High Performance Symmetric Key Cryptography Using Enterprise Grids
Today’s cryptanalysis on symmetric key cryptography is encouraging the use of larger key sizes and complex algorithms to achieve an unbreakable state. However, this leads an inc...
Agus Setiawan, David Adiutama, Julius Liman, Aksha...
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
14 years 1 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
VLSID
2003
IEEE
208views VLSI» more  VLSID 2003»
14 years 1 months ago
Cryptosystem Designed for Embedded System Security
— This paper reports a cryptosystem designed for security of embedded systems. It is based on the theory of Cellular Automata(CA). The Cellular Automata based Cryptosystem(CAC) e...
Subhayan Sen, Sk. Iqbal Hossain, Kabirul Islam, Di...
IEEEMSP
2002
IEEE
177views Multimedia» more  IEEEMSP 2002»
14 years 24 days ago
Data masking: a secure-covert channel paradigm
— It is well known that encryption provides secure channels for communicating entities. However, due to lack of covertness on these channels, an eavesdropper can identify encrypt...
Regunathan Radhakrishnan, Kulesh Shanmugasundaram,...
FSE
2010
Springer
144views Cryptology» more  FSE 2010»
14 years 20 days ago
Pseudo-cryptanalysis of the Original Blue Midnight Wish
The hash function Blue Midnight Wish (BMW) is a candidate in the SHA-3 competition organised by the U.S. National Institute of Standards and Technology (NIST). BMW was selected fo...
Søren S. Thomsen