Sciweavers

IMA
2009
Springer
152views Cryptology» more  IMA 2009»
14 years 6 months ago
Codes as Modules over Skew Polynomial Rings
In previous works we considered codes defined as ideals of quotients of skew polynomial rings, so called Ore rings of automorphism type. In this paper we consider codes defined a...
Delphine Boucher, Felix Ulmer
IMA
2009
Springer
145views Cryptology» more  IMA 2009»
14 years 6 months ago
On Designs and Multiplier Groups Constructed from Almost Perfect Nonlinear Functions
Let f : F n 2 → F n 2 be an almost perfect nonlinear function (APN). The set Df := {(a, b) : f(x + a) − f(x) = b has two solutions} can be used to distinguish APN functions up ...
Yves Edel, Alexander Pott
IMA
2009
Springer
124views Cryptology» more  IMA 2009»
14 years 6 months ago
Comparing with RSA
A multi-set (ms) is a set where an element can occur more than once. ms hash functions (mshfs) map mss of arbitrary cardinality to fixed-length strings. This paper introduces a ne...
Julien Cathalo, David Naccache, Jean-Jacques Quisq...
IMA
2009
Springer
149views Cryptology» more  IMA 2009»
14 years 6 months ago
Practical Zero-Knowledge Proofs for Circuit Evaluation
Essam Ghadafi, Nigel P. Smart, Bogdan Warinschi
IMA
2009
Springer
113views Cryptology» more  IMA 2009»
14 years 6 months ago
On Linear Cryptanalysis with Many Linear Approximations
Abstract. In this paper we present a theoretical framework to quantify the information brought by several linear approximations of a blockcipher without putting any restriction on ...
Benoît Gérard, Jean-Pierre Tillich
IMA
2009
Springer
134views Cryptology» more  IMA 2009»
14 years 6 months ago
The Rayleigh Quotient of Bent Functions
The Rayleigh quotient of a bent function is an invariant under the action of the orthogonal group, and it measures the distance of the function to its dual. An efficient algorithm ...
Lars Eirik Danielsen, Matthew G. Parker, Patrick S...
IMA
2009
Springer
221views Cryptology» more  IMA 2009»
14 years 6 months ago
Cache Timing Analysis of LFSR-Based Stream Ciphers
Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated ag...
Gregor Leander, Erik Zenner, Philip Hawkes
IMA
2009
Springer
139views Cryptology» more  IMA 2009»
14 years 6 months ago
Security of Cyclic Double Block Length Hash Functions
Abstract. We provide the first proof of security for Abreast-DM, one of the oldest and most wellknown constructions for turning a block cipher with n-bit block length and 2n-bit k...
Ewan Fleischmann, Michael Gorski, Stefan Lucks
IMA
2009
Springer
152views Cryptology» more  IMA 2009»
14 years 6 months ago
Double-Exponentiation in Factor-4 Groups and Its Applications
In previous work we showed how to compress certain prime-order subgroups of the cyclotomic subgroups of orders 22m + 1 of the multiplicative groups of F∗ 24m by a factor of 4. We...
Koray Karabina
IMA
2009
Springer
111views Cryptology» more  IMA 2009»
14 years 6 months ago
Geometric Ideas for Cryptographic Equation Solving in Even Characteristic
Abstract. The GeometricXL algorithm is a geometrically invariant version of the XL algorithm that uses polynomials of a much smaller degree than either a standard Groebner basis al...
Sean Murphy, Maura B. Paterson