Sciweavers

1898 search results - page 5 / 380
» Weak Keys for IDEA
Sort
View
148
Voted
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
16 years 4 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
144
Voted
STOC
2005
ACM
110views Algorithms» more  STOC 2005»
16 years 4 months ago
Key agreement from weak bit agreement
Assume that Alice and Bob, given an authentic channel, have a protocol where they end up with a bit SA and SB, respectively, such that with probability 1+ 2 these bits are equal. ...
Thomas Holenstein
131
Voted
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
15 years 7 months ago
Idea Generation Techniques among Creative Professionals
The creative process has been a key topic research over the past century, but it wasn’t until the last decade that creativity became a hot topic of research in the HCI. It is an...
Scarlett R. Herring, Brett R. Jones, Brian P. Bail...
215
Voted
ASIACRYPT
1999
Springer
15 years 8 months ago
Equivalent Keys of HPC
This paper presents a weakness in the key schedule of the AES candidate HPC (Hasty Pudding Cipher). It is shown that for the HPC version with a 128-bit key, 1 in 256 keys is weak i...
Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincen...
131
Voted
CTRSA
2008
Springer
160views Cryptology» more  CTRSA 2008»
15 years 5 months ago
Fault Analysis Study of IDEA
We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher's specific property to employ ...
Christophe Clavier, Benedikt Gierlichs, Ingrid Ver...