Sciweavers

1898 search results - page 5 / 380
» Weak Keys for IDEA
Sort
View
PKC
2009
Springer
240views Cryptology» more  PKC 2009»
14 years 9 months ago
Distributed Public-Key Cryptography from Weak Secrets
Abstract.We introduce the notion of distributed password-based publickey cryptography, where a virtual high-entropy private key is implicitly dened as a concatenation of low-entrop...
Céline Chevalier, David Pointcheval, Michel...
STOC
2005
ACM
110views Algorithms» more  STOC 2005»
14 years 9 months ago
Key agreement from weak bit agreement
Assume that Alice and Bob, given an authentic channel, have a protocol where they end up with a bit SA and SB, respectively, such that with probability 1+ 2 these bits are equal. ...
Thomas Holenstein
HICSS
2009
IEEE
108views Biometrics» more  HICSS 2009»
13 years 11 months ago
Idea Generation Techniques among Creative Professionals
The creative process has been a key topic research over the past century, but it wasn’t until the last decade that creativity became a hot topic of research in the HCI. It is an...
Scarlett R. Herring, Brett R. Jones, Brian P. Bail...
ASIACRYPT
1999
Springer
14 years 26 days ago
Equivalent Keys of HPC
This paper presents a weakness in the key schedule of the AES candidate HPC (Hasty Pudding Cipher). It is shown that for the HPC version with a 128-bit key, 1 in 256 keys is weak i...
Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincen...
CTRSA
2008
Springer
160views Cryptology» more  CTRSA 2008»
13 years 10 months ago
Fault Analysis Study of IDEA
We present a study of several fault attacks against the block cipher IDEA. Such a study is particularly interesting because of the target cipher's specific property to employ ...
Christophe Clavier, Benedikt Gierlichs, Ingrid Ver...