Sciweavers

81 search results - page 6 / 17
» Improving Fast Algebraic Attacks
Sort
View
IACR
2011
177views more  IACR 2011»
12 years 7 months ago
New attacks on Keccak-224 and Keccak-256
The Keccak hash function is one of the five finalists in NIST’s SHA-3 competition, and so far it showed remarkable resistance against practical collision finding attacks: Afte...
Itai Dinur, Orr Dunkelman, Adi Shamir
CRYPTO
2011
Springer
237views Cryptology» more  CRYPTO 2011»
12 years 7 months ago
Automatic Search of Attacks on Round-Reduced AES and Applications
In this paper, we describe versatile and powerful algorithms for searching guess-and-determine and meet-in-the-middle attacks on byte-oriented symmetric primitives. To demonstrate ...
Charles Bouillaguet, Patrick Derbez, Pierre-Alain ...
TCAD
2008
107views more  TCAD 2008»
13 years 7 months ago
Power Grid Analysis and Optimization Using Algebraic Multigrid
Abstract--This paper presents a class of power grid analysis and optimization techniques, all of which are based on the algebraic-multigrid (AMG) method. First, a new AMG-based red...
Cheng Zhuo, Jiang Hu, Min Zhao, Kangsheng Chen
CHES
2007
Springer
105views Cryptology» more  CHES 2007»
14 years 1 months ago
On the Implementation of a Fast Prime Generation Algorithm
Abstract. A side-channel analysis of a cryptographic algorithm generally concentrates on the encryption or decryption phases, rarely on the key generation phase. In this paper, we ...
Christophe Clavier, Jean-Sébastien Coron
ICCCN
2007
IEEE
14 years 1 months ago
Multi-channel Jamming Attacks using Cognitive Radios
To improve spectrum efficiency, future wireless devices will use cognitive radios to dynamically access spectrum. While offering great flexibility and softwarereconfigurability...
Ashwin Sampath, Hui Dai, Haitao Zheng, Ben Y. Zhao