Sciweavers

INDOCRYPT
2010
Springer
13 years 9 months ago
Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers
Abstract. This paper presents the first results on AIDA/cube, algebraic and sidechannel attacks on variable number of rounds of all members of the KATAN family of block ciphers. Ou...
Gregory V. Bard, Nicolas Courtois, Jorge Nakahara,...
INDOCRYPT
2010
Springer
13 years 9 months ago
Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions
Abstract. Consider the RSA public key cryptosystem with the parameters N = pq, q < p < 2q, public encryption exponent e and private decryption exponent d. In this paper, cryp...
Santanu Sarkar, Sourav Sengupta, Subhamoy Maitra
INDOCRYPT
2010
Springer
13 years 9 months ago
CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key
Multivariate Cryptography is one of the alternatives to guarantee the security of communication in the post-quantum world. One major drawback of such schemes is the huge size of th...
Albrecht Petzoldt, Stanislav Bulygin, Johannes Buc...
FDTC
2010
Springer
118views Cryptology» more  FDTC 2010»
13 years 9 months ago
Low Cost Built in Self Test for Public Key Crypto Cores
The testability of the cryptographic cores brings in an extra dimension to the process of digital circuits testing
Dusko Karaklajic, Miroslav Knezevic, Ingrid Verbau...
FDTC
2010
Springer
138views Cryptology» more  FDTC 2010»
13 years 9 months ago
A Continuous Fault Countermeasure for AES Providing a Constant Error Detection Rate
Many implementations of cryptographic algorithms have shown to be susceptible to fault attacks. For some of them, countermeasures against specific fault models have been proposed. ...
Marcel Medwed, Jörn-Marc Schmidt
FDTC
2010
Springer
124views Cryptology» more  FDTC 2010»
13 years 9 months ago
Optical Fault Masking Attacks
This paper introduces some new types of optical fault attacks called fault masking attacks. These attacks are aimed at disrupting of the normal memory operation through preventing ...
Sergei Skorobogatov
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 9 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...
CANS
2010
Springer
258views Cryptology» more  CANS 2010»
13 years 9 months ago
Cryptanalysis of Reduced-Round MIBS Block Cipher
Abstract. This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at ...
Asli Bay, Jorge Nakahara, Serge Vaudenay
CANS
2010
Springer
159views Cryptology» more  CANS 2010»
13 years 9 months ago
Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems
Johannes Buchmann, Stanislav Bulygin, Jintai Ding,...