Sciweavers

ACISP
2000
Springer
14 years 5 months ago
Cryptanalysis of the m-Permutation Protection Schemes
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP'98, Fung and Gray proposed an −m permutation protecti...
Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
ACISP
2000
Springer
14 years 5 months ago
An Implementation of Bitsliced DES on the Pentium MMXTM Processor
In this paper we describe an implementation of the DES (and Triple-DES) algorithm using the bitslicing technique on an Intel Pentium MMX processor. Implementation specifics are di...
Lauren May, Lyta Penna, Andrew Clark
ACISP
2000
Springer
14 years 5 months ago
PKI Seeks a Trusting Relationship
All human co-operation is based on trust, meaning that we choose co-operation partners and make commitment decisions based on how much we trust the other party. Digital certificat...
Audun Jøsang, Ingar Glenn Pedersen, Dean Po...
ACISP
2000
Springer
14 years 5 months ago
High Performance Agile Crypto Modules
This paper examines the impact of the primary symmetric key cryptographic operation on network data streams, encryption of user data, have on the overall tra c throughput. The encr...
Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
ACISP
2000
Springer
14 years 5 months ago
An Extremely Small and Efficient Identification Scheme
We present a new identification scheme which is based on Legendre symbols modulo a certain hidden prime and which is naturally suited for low power, low memory applications. 1 Ove...
William D. Banks, Daniel Lieman, Igor Shparlinski
ACISP
2000
Springer
14 years 5 months ago
Security Weaknesses in a Randomized Stream Cipher
Abstract. TriStrata appears to have implemented a variation of Maurer’s randomised cipher. We define a variation of Maurer’s cipher that appears to be similar to the TriStrata...
Niels Ferguson, Bruce Schneier, David Wagner
ACISP
2000
Springer
14 years 5 months ago
Two-Stage Optimisation in the Design of Boolean Functions
This paper shows how suitable choice of cost function can significantly affect the power of optimisation methods for the synthesising of Boolean functions. In particular we show ...
John A. Clark, Jeremy Jacob