Sciweavers

59 search results - page 4 / 12
» Key-Recovery Attacks on ASASA
Sort
View
EUROCRYPT
2001
Springer
14 years 3 days ago
Key Recovery and Message Attacks on NTRU-Composite
NTRU is a fast public key cryptosystem presented in 1996 by Hoffstein, Pipher and Silverman of Brown University. It operates in the ring of polynomials Z[X]/(XN − 1), where the ...
Craig Gentry
EUROCRYPT
2008
Springer
13 years 9 months ago
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Lei Wang, Kazuo Ohta, Noboru Kunihiro
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
12 years 11 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
CRYPTO
2004
Springer
154views Cryptology» more  CRYPTO 2004»
14 years 1 months ago
An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators
Abstract. In this paper we propose a new key recovery attack on irregular clocked keystream generators where the stream is filtered by a nonlinear Boolean function. We show that t...
Håvard Molland, Tor Helleseth