Sciweavers

SACRYPT
2004
Springer
14 years 6 months ago
On Proactive Secret Sharing Schemes
Abstract. This paper investigates the security of Proactive Secret Sharing Schemes. We start with revision of the mobile adversary model of Herzberg’s et al. imposing less restri...
Ventzislav Nikov, Svetla Nikova
SACRYPT
2004
Springer
135views Cryptology» more  SACRYPT 2004»
14 years 6 months ago
An Improved Correlation Attack on A5/1
Alexander Maximov, Thomas Johansson, Steve Babbage
SACRYPT
2004
Springer
143views Cryptology» more  SACRYPT 2004»
14 years 6 months ago
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
Abstract. This paper formalizes the security adversarial games for online symmetric cryptosystems in a unified framework for deterministic and probabilistic encryption schemes. On...
Pierre-Alain Fouque, Antoine Joux, Guillaume Poupa...
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
14 years 6 months ago
FOX : A New Family of Block Ciphers
In this paper, we describe the design of a new family of block ciphers based on a Lai-Massey scheme, named FOX. The main features of this design, besides a very high security level...
Pascal Junod, Serge Vaudenay
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
14 years 6 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...
SACRYPT
2004
Springer
125views Cryptology» more  SACRYPT 2004»
14 years 6 months ago
Password Based Key Exchange with Mutual Authentication
A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Li...
Shaoquan Jiang, Guang Gong
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
14 years 6 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi
SACRYPT
2004
Springer
14 years 6 months ago
Modular Number Systems: Beyond the Mersenne Family
Jean-Claude Bajard, Laurent Imbert, Thomas Plantar...