Sciweavers

583 search results - page 65 / 117
» On the Complexity of Matsui's Attack
Sort
View
ANSS
2000
IEEE
14 years 28 days ago
Using the DEVS Paradigm to Implement a Simulated Processor
This work is devoted to present the design and implementation of Alfa-1, a simulated computer with educational purposes. The DEVS formalism was used to attack the complexity of th...
Sergio Daicz, Alejandro Troccoli, Sergio Zlotnik, ...
EUROCRYPT
1999
Springer
14 years 23 days ago
On the Concurrent Composition of Zero-Knowledge Proofs
We examine the concurrent composition of zero-knowledge proofs. By concurrent composition, we indicate a single prover that is involved in multiple, simultaneous zero-knowledge pro...
Ransom Richardson, Joe Kilian
IJWMC
2007
66views more  IJWMC 2007»
13 years 8 months ago
Grain: a stream cipher for constrained environments
Abstract. A new stream cipher, Grain, is proposed. The design targets hardware environments where gate count, power consumption and memory is very limited. It is based on two shift...
Martin Hell, Thomas Johansson, Willi Meier
SP
2002
IEEE
121views Security Privacy» more  SP 2002»
13 years 8 months ago
Intrusion-Tolerant Enclaves
Despite our best efforts, any sufficiently complex computer system has vulnerabilities. It is safe to assume that such vulnerabilities can be exploited by attackers who will be ab...
Bruno Dutertre, Valentin Crettaz, Victoria Stavrid...
CANS
2011
Springer
254views Cryptology» more  CANS 2011»
12 years 8 months ago
Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48
Abstract. In this paper we analyze the recently proposed light-weight block cipher PRINTCipher. Applying algebraic methods and SAT-solving we are able to break 8 rounds of PRINTCip...
Stanislav Bulygin, Johannes Buchmann