Sciweavers

386 search results - page 7 / 78
» The Block Cipher Rijndael
Sort
View
ICC
2009
IEEE
155views Communications» more  ICC 2009»
13 years 8 months ago
On Hashing with Tweakable Ciphers
Cryptographic hash functions are often built on block ciphers in order to reduce the security of the hash to that of the cipher, and to minimize the hardware size. Proven secure co...
Raphael Chung-Wei Phan, Jean-Philippe Aumasson
DATE
2003
IEEE
92views Hardware» more  DATE 2003»
14 years 4 months ago
A Low Device Occupation IP to Implement Rijndael Algorithm
This work presents a soft IP description of Rijndael, the Advanced Encryption Standard (AES) of National Institute of Standards and Technology (NIST). This Rijndael implementation...
Alex Panato, Marcelo Barcelos, Ricardo Augusto da ...
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
13 years 8 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
CHES
2009
Springer
239views Cryptology» more  CHES 2009»
14 years 11 months ago
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its ph...
François-Xavier Standaert, Mathieu Renauld,...
AC
1998
Springer
14 years 2 months ago
Contemporary Block Ciphers
This paper considers modern secret-key block ciphers. The theory behind the design and analysis of modern block ciphers is explained, and the most important known attacks are outli...
Lars R. Knudsen