Abstract. At CHES 2001, Walter introduced the Big Mac attack against an implementation of rsa. It is an horizontal collision attack, based on the detection of common operands in tw...
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvor...
Companies as well as individual users are adopting cloud solutions at an over-increasing rate for storing data and making them accessible to others. While migrating data to the clo...
Sabrina De Capitani di Vimercati, Sara Foresti, Gi...
Abstract. Dual EC is an algorithm to compute pseudorandom numbers starting from some random input. Dual EC was standardized by NIST, ANSI, and ISO among other algorithms to generat...
Daniel J. Bernstein, Tanja Lange, Ruben Niederhage...
Modular multiplication and modular reduction are the atomic constituents of most public-key cryptosystems. Amongst the numerous algorithms for performing these operations, a partic...
Abstract. GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. A 256-bit block cipher considered as an alternative for AES-25...
We describe a novel approach to reduce the impact of spoofing by a subtle change in the login process. At the heart of our contribution is the understanding that current anti-spo...
Moessner’s Theorem describes a construction of the sequence of powers (1n , 2n , 3n , . . . ), by repeatedly dropping and summing elements from the sequence of positive natural n...
Existing treatments of Dijkstra’s guarded-command language treat divergence and failure as equivalent, even though Dijkstra clearly states they are not. We reexamine Dijkstra’s...