Sciweavers

ECCSP
1993
130views Cryptology» more  ECCSP 1993»
14 years 21 days ago
Tables of Coverings for Decoding by S-Sets
I. L. Asnis, Sergei V. Fedorenko, E. A. Krouk, E. ...
CRYPTO
1994
Springer
144views Cryptology» more  CRYPTO 1994»
14 years 21 days ago
Differential-Linear Cryptanalysis
Differential cryptanalysis analyzes ciphers by studying the development of differences during encryption. Linear cryptanalysis is similar but is based on studying approximate linea...
Susan K. Langford, Martin E. Hellman
CRYPTO
1994
Springer
128views Cryptology» more  CRYPTO 1994»
14 years 21 days ago
Linear Cryptanalysis Using Multiple Approximations
We present a technique which aids in the linear cryptanalysis of a block cipher and allows for a reduction in the amount of data required for a successful attack. We note the limit...
Burton S. Kaliski Jr., Matthew J. B. Robshaw
CRYPTO
1994
Springer
104views Cryptology» more  CRYPTO 1994»
14 years 21 days ago
Cryptographic Randomness from Air Turbulence in Disk Drives
Abstract. A computer disk drive's motor speed varies slightly but irregularly, principally because of air turbulence inside the disk's enclosure. The unpredictability of ...
Don Davis, Ross Ihaka, Philip Fenstermacher
CRYPTO
1994
Springer
98views Cryptology» more  CRYPTO 1994»
14 years 21 days ago
Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols
Suppose we are given a proof of knowledge P in which a prover demonstrates that he knows a solution to a given problem instance. Suppose also that we have a secret sharing scheme S...
Ronald Cramer, Ivan Damgård, Berry Schoenmak...
CRYPTO
1994
Springer
116views Cryptology» more  CRYPTO 1994»
14 years 21 days ago
Tracing Traitors
We give cryptographic schemes that help trace the source of leaks when sensitive or proprietary data is made available to a large set of parties. A very relevant application is in ...
Benny Chor, Amos Fiat, Moni Naor
CRYPTO
1994
Springer
100views Cryptology» more  CRYPTO 1994»
14 years 21 days ago
Incremental Cryptography: The Case of Hashing and Signing
Mihir Bellare, Oded Goldreich, Shafi Goldwasser
CRYPTO
1993
Springer
168views Cryptology» more  CRYPTO 1993»
14 years 21 days ago
Cryptanalysis of the CFB Mode of the DES with a Reduced Number of Rounds
Three attacks on the DES with a reduced number of rounds in the Cipher Feedback Mode (CFB) are studied, namely a meet in the middle attack, a differential attack, and a linear att...
Bart Preneel, Marnix Nuttin, Vincent Rijmen, Johan...