Sciweavers

12 search results - page 1 / 3
» sacrypt 2005
Sort
View
SACRYPT
2005
Springer
14 years 2 months ago
Fault Attacks on Combiners with Memory
Frederik Armknecht, Willi Meier
SACRYPT
2005
Springer
125views Cryptology» more  SACRYPT 2005»
14 years 2 months ago
Breaking a New Hash Function Design Strategy Called SMASH
Norbert Pramstaller, Christian Rechberger, Vincent...
SACRYPT
2005
Springer
14 years 2 months ago
Impact of Rotations in SHA-1 and Related Hash Functions
Norbert Pramstaller, Christian Rechberger, Vincent...
SACRYPT
2005
Springer
146views Cryptology» more  SACRYPT 2005»
14 years 2 months ago
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
In a hierarchical structure, an entity has access to another if and only if the former is a superior of the later. The access control scheme for a hierarchy represented by a partia...
Jiang Wu, Ruizhong Wei
SACRYPT
2005
Springer
14 years 2 months ago
SPA Resistant Left-to-Right Integer Recodings
We present two left-to-right integer recodings which can be used to perform scalar multiplication with a fixed sequence of operations. These recodings make it possible to have a s...
Nicolas Thériault