Sciweavers

12 search results - page 2 / 3
» sacrypt 2005
Sort
View
SACRYPT
2005
Springer
138views Cryptology» more  SACRYPT 2005»
14 years 2 months ago
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners
A vast amount of literature on stream ciphers is directed to the cryptanalysis of LFSR-based filters and combiners, resulting in various attack models such as distinguishing attac...
An Braeken, Joseph Lano
SACRYPT
2005
Springer
14 years 2 months ago
Proving the Security of AES Substitution-Permutation Network
In this paper we study the substitution-permutation network (SPN) on which AES is based. We introduce AES∗ , a SPN identical to AES except that fixed S-boxes are replaced by ran...
Thomas Baignères, Serge Vaudenay
SACRYPT
2005
Springer
14 years 2 months ago
An Attack on CFB Mode Encryption as Used by OpenPGP
This paper describes an adaptive-chosen-ciphertext attack on the Cipher Feedback (CFB) mode of encryption as used in OpenPGP. In most circumstances it will allow an attacker to det...
Serge Mister, Robert J. Zuccherato
SACRYPT
2005
Springer
109views Cryptology» more  SACRYPT 2005»
14 years 2 months ago
Reducing Time Complexity in RFID Systems
Radio frequency identification systems based on low-cost computing devices is the new plaything that every company would like to adopt. Its goal can be either to improve the produ...
Gildas Avoine, Etienne Dysli, Philippe Oechslin
SACRYPT
2005
Springer
112views Cryptology» more  SACRYPT 2005»
14 years 2 months ago
Pairing-Friendly Elliptic Curves of Prime Order
Previously known techniques to construct pairing-friendly curves of prime or near-prime order are restricted to embedding degree k 6. More general methods produce curves over Fp wh...
Paulo S. L. M. Barreto, Michael Naehrig