Sciweavers

731 search results - page 40 / 147
» New Security Results on Encrypted Key Exchange
Sort
View
IMA
2007
Springer
137views Cryptology» more  IMA 2007»
14 years 4 months ago
Algebraic Cryptanalysis of the Data Encryption Standard
In spite of growing importance of AES, the Data Encryption Standard is by no means obsolete. DES has never been broken from the practical point of view. The triple DES is believed ...
Nicolas Courtois, Gregory V. Bard
FSE
1999
Springer
83views Cryptology» more  FSE 1999»
14 years 2 months ago
On the Security of Double and 2-Key Triple Modes of Operation
The DES has reached the end of its lifetime due to its too short key length and block length (56 and 64 bits respectively). As we are awaiting the new AES, triple (and double) encr...
Helena Handschuh, Bart Preneel
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
14 years 2 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
IJES
2006
93views more  IJES 2006»
13 years 10 months ago
Dynamically configurable security for SRAM FPGA bitstreams
This paper proposes a solution to improve the security of SRAM FPGAs through bitstream encryption. This proposition is distinct from other works because it uses the latest capabil...
Lilian Bossuet, Guy Gogniat, Wayne Burleson
EUROCRYPT
2008
Springer
14 years 12 days ago
The Twin Diffie-Hellman Problem and Applications
ded abstract of this paper appears in Advances in Cryptology -- EUROCRYPT '08, Lecture Notes in Computer Science Vol. 4965, N. Smart ed., Springer-Verlag, 2008. This is the fu...
David Cash, Eike Kiltz, Victor Shoup