Sciweavers

95 search results - page 14 / 19
» Improved Cryptanalysis of Rijndael
Sort
View
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
14 years 7 months ago
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
MULTI2 is the block cipher used in the ISDB standard for scrambling digital multimedia content. MULTI2 is used in Japan to secure multimedia broadcasting, including recent applicat...
Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan...
CHES
2007
Springer
95views Cryptology» more  CHES 2007»
14 years 1 months ago
Side Channel Cryptanalysis of a Higher Order Masking Scheme
Abstract. In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order DPA have been improved and successfully applied to break many masked implementat...
Jean-Sébastien Coron, Emmanuel Prouff, Matt...
CRYPTO
1993
Springer
168views Cryptology» more  CRYPTO 1993»
13 years 11 months ago
Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds
Three attacks on the DES with a reduced number of rounds in the Cipher Feedback Mode (CFB) are studied, namely a meet in the middle attack, a differential attack, and a linear att...
Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan...
CORR
2010
Springer
212views Education» more  CORR 2010»
13 years 7 months ago
Cryptanalysis of a more efficient and secure dynamic id-based remote user authentication scheme
In 2004, Das, Saxena and Gulati proposed a dynamic ID-based remote user authentication scheme which has many advantage such as no verifier table, user freedom to choose and change...
Mohammed Aijaz Ahmed, D. Rajya Lakshmi, Sayed Abdu...
AFRICACRYPT
2008
Springer
14 years 1 months ago
Cryptanalysis of the TRMS Signature Scheme of PKC'05
In this paper, we investigate the security of the Tractable Rationale Maps Signature (TRMS) signature scheme [9] proposed at PKC’05. To do so, we present a hybrid approach for so...
Luk Bettale, Jean-Charles Faugère, Ludovic ...