Sciweavers

123
Voted
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
15 years 10 months ago
A Very Compact "Perfectly Masked" S-Box for AES
Implementations of the Advanced Encryption Standard (AES), including hardware applications with limited resources (e.g., smart cards), may be vulnerable to ā€œside-channel attacksā...
D. Canright, Lejla Batina
99
Voted
ACNS
2008
Springer
107views Cryptology» more  ACNS 2008»
15 years 10 months ago
Attacking Reduced Round SHA-256
The SHA-256 hash function has started getting attention recently by the cryptanalysis community
Somitra Kumar Sanadhya, Palash Sarkar
133
Voted
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
15 years 10 months ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer