Sciweavers

ICISC
2009
163views Cryptology» more  ICISC 2009»
13 years 9 months ago
Improved Linear Cryptanalysis of SOSEMANUK
The SOSEMANUK stream cipher is one of the finalists of the eSTREAM project. In this paper, we improve the linear cryptanalysis of SOSEMANUK presented in Asiacrypt 2008. We apply th...
Joo Yeon Cho, Miia Hermelin
ICISC
2009
120views Cryptology» more  ICISC 2009»
13 years 9 months ago
Factoring Unbalanced Moduli with Known Bits
Eric Brier, David Naccache, Mehdi Tibouchi
ICISC
2009
132views Cryptology» more  ICISC 2009»
13 years 9 months ago
Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications
Abstract. The design of embedded processors demands a careful tradeoff between many conflicting objectives such as performance, silicon area and power consumption. Finding such a t...
Johann Großschädl, Elisabeth Oswald, Da...
ICISC
2009
138views Cryptology» more  ICISC 2009»
13 years 9 months ago
Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson
At CANS 2008, Mashatan and Stinson suggested a message recognition protocol for ad hoc pervasive networks. The protocol provides a procedure to resynchronize in case of a (possibly...
Madeline González Muñiz, Rainer Stei...
ICISC
2009
146views Cryptology» more  ICISC 2009»
13 years 9 months ago
First CPIR Protocol with Data-Dependent Computation
We design a new (n, 1)-CPIR protocol BddCpir for -bit strings as a combination of a noncryptographic (BDD-based) data structure and a more basic cryptographic primitive (communicat...
Helger Lipmaa
ICISC
2009
120views Cryptology» more  ICISC 2009»
13 years 9 months ago
Secret Handshakes with Revocation Support
Alessandro Sorniotti, Refik Molva
ICISC
2009
125views Cryptology» more  ICISC 2009»
13 years 9 months ago
Power Analysis of Single-Rail Storage Elements as Used in MDPL
Several dual-rail logic styles make use of single-rail flip-flops for storing intermediate states. We show that single mask bits, as applied by various side-channel resistant logic...
Amir Moradi, Thomas Eisenbarth, Axel Poschmann, Ch...
ICISC
2009
140views Cryptology» more  ICISC 2009»
13 years 9 months ago
Serial Model for Attack Tree Computations
Aivo Jürgenson, Jan Willemson
ICISC
2009
108views Cryptology» more  ICISC 2009»
13 years 9 months ago
Lightweight Cryptography and RFID: Tackling the Hidden Overheads
Abstract. The field of lightweight cryptography has developed significantly over recent years and many impressive implementation results have been published. However these results ...
Axel Poschmann, Matthew J. B. Robshaw, Frank Vater...
ICISC
2009
169views Cryptology» more  ICISC 2009»
13 years 9 months ago
Generic One Round Group Key Exchange in the Standard Model
Minimizing complexity of group key exchange (GKE) protocols is an important milestone towards their practical deployment. An interesting approach to achieve this goal is to simplif...
M. Choudary Gorantla, Colin Boyd, Juan Manuel Gonz...