Sciweavers

IMA
2009
Springer
139views Cryptology» more  IMA 2009»
14 years 2 months ago
Security of Cyclic Double Block Length Hash Functions
Abstract. We provide the first proof of security for Abreast-DM, one of the oldest and most wellknown constructions for turning a block cipher with n-bit block length and 2n-bit k...
Ewan Fleischmann, Michael Gorski, Stefan Lucks
IMA
2009
Springer
152views Cryptology» more  IMA 2009»
14 years 2 months ago
Double-Exponentiation in Factor-4 Groups and Its Applications
In previous work we showed how to compress certain prime-order subgroups of the cyclotomic subgroups of orders 22m + 1 of the multiplicative groups of F∗ 24m by a factor of 4. We...
Koray Karabina
IMA
2009
Springer
111views Cryptology» more  IMA 2009»
14 years 2 months ago
Geometric Ideas for Cryptographic Equation Solving in Even Characteristic
Abstract. The GeometricXL algorithm is a geometrically invariant version of the XL algorithm that uses polynomials of a much smaller degree than either a standard Groebner basis al...
Sean Murphy, Maura B. Paterson
IMA
2009
Springer
131views Cryptology» more  IMA 2009»
14 years 2 months ago
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems
Gaudry and Schost gave a low-memory algorithm for solving the 2-dimensional discrete logarithm problem. We present an improvement to their algorithm and extend this improvement to ...
Steven D. Galbraith, Raminder S. Ruprai
IMA
2009
Springer
132views Cryptology» more  IMA 2009»
14 years 2 months ago
Subspace Codes
Abstract. This paper is a survey of bounds and constructions for subspace codes designed for the injection metric, a distance measure that arises in the context of correcting adver...
Azadeh Khaleghi, Danilo Silva, Frank R. Kschischan...
FDTC
2009
Springer
100views Cryptology» more  FDTC 2009»
14 years 2 months ago
Using Optical Emission Analysis for Estimating Contribution to Power Analysis
—This paper shows that optical emissions from an operating chip have a good correlation with power traces and can therefore be used to estimate the contribution of different area...
Sergei P. Skorobogatov
FDTC
2009
Springer
191views Cryptology» more  FDTC 2009»
14 years 2 months ago
Protecting RSA against Fault Attacks: The Embedding Method
—Fault attacks constitute a major threat toward cryptographic products supporting RSA-based technologies. Most often, the public exponent is unknown, turning resistance to fault ...
Marc Joye
FDTC
2009
Springer
126views Cryptology» more  FDTC 2009»
14 years 2 months ago
WDDL is Protected against Setup Time Violation Attacks
—In order to protect crypto-systems against side channel attacks various countermeasures have been implemented such as dual-rail logic or masking. Faults attacks are a powerful t...
Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Ta...
FDTC
2009
Springer
104views Cryptology» more  FDTC 2009»
14 years 2 months ago
Low Voltage Fault Attacks on the RSA Cryptosystem
—Fault injection attacks are a powerful tool to exploit implementative weaknesses of robust cryptographic algorithms. The faults induced during the computation of the cryptograph...
Alessandro Barenghi, Guido Bertoni, Emanuele Parri...