Sciweavers

35 search results - page 5 / 7
» ae 2009
Sort
View
DCC
2009
IEEE
14 years 2 months ago
On Compression of Data Encrypted with Block Ciphers
This paper investigates compression of encrypted data. It has been previously shown that data encrypted with Vernam’s scheme [1], also known as the one-time pad, can be compress...
Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo...
ICC
2009
IEEE
125views Communications» more  ICC 2009»
14 years 2 months ago
Cryptanalysis of Substitution Cipher Chaining Mode (SCC)
In this paper, we present an enhanced cryptanalysis of the Substitution Cipher Chaining mode (SCC) [1]. In [2], SCC-128 (SCC which uses AES with 128-bit key) was broken using 5 att...
Mohamed Abo El-Fotouh, Klaus Diepold
ASIACRYPT
2009
Springer
14 years 2 months ago
Secure Two-Party Computation Is Practical
Abstract. Secure multi-party computation has been considered by the cryptographic community for a number of years. Until recently it has been a purely theoretical area, with few im...
Benny Pinkas, Thomas Schneider, Nigel P. Smart, St...
WISA
2009
Springer
14 years 2 months ago
Unknown Plaintext Template Attacks
In this paper we present a variation of the template attack classification process that can be applied to block ciphers when the plaintext and ciphertext used are unknown. In a na...
Neil Hanley, Michael Tunstall, William P. Marnane
ICISC
2009
132views Cryptology» more  ICISC 2009»
13 years 5 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...