Sciweavers

281 search results - page 41 / 57
» Non-black-box Techniques in Cryptography
Sort
View
CTRSA
2010
Springer
189views Cryptology» more  CTRSA 2010»
14 years 4 months ago
Linear Cryptanalysis of Reduced-Round PRESENT
Abstract. PRESENT is a hardware-oriented block cipher suitable for resource constrained environment. In this paper we analyze PRESENT by the multidimensional linear cryptanalysis m...
Joo Yeon Cho
ACNS
2009
Springer
143views Cryptology» more  ACNS 2009»
14 years 4 months ago
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks
Abstract. We examine the problem of message recognition by reviewing the definitions and the security model in the literature. In particular, we examine the Jane Doe protocol, whi...
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
FC
2009
Springer
106views Cryptology» more  FC 2009»
14 years 4 months ago
Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing
Attackers compromise web servers in order to host fraudulent content, such as malware and phishing websites. While the techniques used to compromise websites are widely discussed a...
Tyler Moore, Richard Clayton
SACRYPT
2009
Springer
155views Cryptology» more  SACRYPT 2009»
14 years 4 months ago
Practical Collisions for SHAMATA-256
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream cipher-like hash function design with components of the AES, and it is one of the ...
Sebastiaan Indesteege, Florian Mendel, Bart Prenee...
DATE
2008
IEEE
89views Hardware» more  DATE 2008»
14 years 4 months ago
EPIC: Ending Piracy of Integrated Circuits
As semiconductor manufacturing requires greater capital investments, the use of contract foundries has grown dramatically, increasing exposure to mask theft and unauthorized exces...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov