Sciweavers

628 search results - page 6 / 126
» On the Twofish Key Schedule
Sort
View
ICTAC
2010
Springer
13 years 8 months ago
Formal Modelling of Separation Kernel Components
Abstract. Separation kernels are key components in embedded applications. Their small size and widespread use in high-integrity environments make them good targets for formal model...
Andrius Velykis, Leo Freitas
SACRYPT
2001
Springer
123views Cryptology» more  SACRYPT 2001»
14 years 2 months ago
Weaknesses in the Key Scheduling Algorithm of RC4
Abstract. Inthis paper we present several weaknesses in the keyscheduling algorithm of RC4, and describe their cryptanalytic signi cance. We identify a large number of weak keys, i...
Scott R. Fluhrer, Itsik Mantin, Adi Shamir
FDTC
2007
Springer
106views Cryptology» more  FDTC 2007»
14 years 3 months ago
DFA Mechanism on the AES Key Schedule
Junko Takahashi, Toshinori Fukunaga, Kimihiro Yama...
AES
2004
Springer
135views Cryptology» more  AES 2004»
14 years 3 months ago
Linearity of the AES Key Schedule
Frederik Armknecht, Stefan Lucks
INFORMATICALT
2002
91views more  INFORMATICALT 2002»
13 years 9 months ago
Bayesian Heuristic Approach to Scheduling
Abstract. Real life scheduling problems are solved by heuristics with parameters defined by experts, as usual. In this paper a new approach is proposed where the parameters of vari...
Jonas Mockus