Sciweavers

72 search results - page 4 / 15
» Practical Cryptanalysis of SFLASH
Sort
View
INDOCRYPT
2010
Springer
13 years 5 months ago
Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions
Abstract. Consider the RSA public key cryptosystem with the parameters N = pq, q < p < 2q, public encryption exponent e and private decryption exponent d. In this paper, cryp...
Santanu Sarkar, Sourav Sengupta, Subhamoy Maitra
CRYPTOLOGIA
2007
81views more  CRYPTOLOGIA 2007»
13 years 7 months ago
Sigaba: Cryptanalysis of the Full Keyspace
In this paper we consider an attack on the SIGABA cipher under the assumption that the largest practical keyspace is used. The attack highlights various strengths and weaknesses o...
Mark Stamp, Wing On Chan
SACRYPT
2005
Springer
138views Cryptology» more  SACRYPT 2005»
14 years 28 days ago
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various attack models such as distinguishing attac...
An Braeken, Joseph Lano
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
14 years 8 months ago
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
MULTI2 is the block cipher used in the ISDB standard for scrambling digital multimedia content. MULTI2 is used in Japan to secure multimedia broadcasting, including recent applicat...
Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan...
CCS
2004
ACM
14 years 25 days ago
Cryptanalysis of a provably secure CRT-RSA algorithm
We study a countermeasure proposed to protect Chinese remainder theorem (CRT) computations for RSA against fault attacks. The scheme was claimed to be provably secure. However, we...
David Wagner