Sciweavers

1064 search results - page 106 / 213
» Cryptography from Anonymity
Sort
View
152
Voted
CHES
2005
Springer
117views Cryptology» more  CHES 2005»
15 years 9 months ago
DPA Leakage Models for CMOS Logic Circuits
In this paper, we propose new models for directly evaluating DPA leakage from logic information in CMOS circuits. These models are based on the transition probability for each gate...
Daisuke Suzuki, Minoru Saeki, Tetsuya Ichikawa
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
15 years 9 months ago
A New Distinguisher for Clock Controlled Stream Ciphers
In this paper we present a distinguisher targeting towards irregularly clocked filter generators. The attack is applied on the irregularly clocked stream cipher called LILI-II. LI...
Håkan Englund, Thomas Johansson
93
Voted
FSE
2005
Springer
107views Cryptology» more  FSE 2005»
15 years 9 months ago
Small Scale Variants of the AES
In this paper we define small scale variants of the AES. These variants inherit the design features of the AES and provide a suitable framework for comparing different cryptanaly...
Carlos Cid, Sean Murphy, Matthew J. B. Robshaw
FSE
2005
Springer
113views Cryptology» more  FSE 2005»
15 years 9 months ago
SMASH - A Cryptographic Hash Function
1 This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and...
Lars R. Knudsen
141
Voted
TCC
2005
Springer
141views Cryptology» more  TCC 2005»
15 years 9 months ago
Public-Key Steganography with Active Attacks
A complexity-theoretic model for public-key steganography with active attacks is introduced. The notion of steganographic security against adaptive chosen-covertext attacks (SS-CC...
Michael Backes, Christian Cachin