Sciweavers

BIRTHDAY
2016
Springer
8 years 7 months ago
Improving the Big Mac Attack on Elliptic Curve Cryptography
Abstract. At CHES 2001, Walter introduced the Big Mac attack against an implementation of rsa. It is an horizontal collision attack, based on the detection of common operands in tw...
Jean-Luc Danger, Sylvain Guilley, Philippe Hoogvor...
BIRTHDAY
2016
Springer
8 years 7 months ago
Buying AES Design Resistance with Speed and Energy
Rodrigo Portella do Canto, Roman Korkikian, David ...
BIRTHDAY
2016
Springer
8 years 7 months ago
Abstract Interpretation of PEPA Models
Stephen Gilmore, Jane Hillston, Natalia Zon
BIRTHDAY
2016
Springer
8 years 7 months ago
Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud
Companies as well as individual users are adopting cloud solutions at an over-increasing rate for storing data and making them accessible to others. While migrating data to the clo...
Sabrina De Capitani di Vimercati, Sara Foresti, Gi...
BIRTHDAY
2016
Springer
8 years 7 months ago
Dual EC: A Standardized Back Door
Abstract. Dual EC is an algorithm to compute pseudorandom numbers starting from some random input. Dual EC was standardized by NIST, ANSI, and ISO among other algorithms to generat...
Daniel J. Bernstein, Tanja Lange, Ruben Niederhage...
BIRTHDAY
2016
Springer
8 years 7 months ago
Double-Speed Barrett Moduli
Modular multiplication and modular reduction are the atomic constituents of most public-key cryptosystems. Amongst the numerous algorithms for performing these operations, a partic...
Rémi Géraud, Diana Maimut, David Nac...
BIRTHDAY
2016
Springer
8 years 7 months ago
An Improved Differential Attack on Full GOST
Abstract. GOST 28147-89 is a well-known block cipher and the official encryption standard of the Russian Federation. A 256-bit block cipher considered as an alternative for AES-25...
Nicolas T. Courtois
BIRTHDAY
2016
Springer
8 years 7 months ago
SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention
We describe a novel approach to reduce the impact of spoofing by a subtle change in the login process. At the heart of our contribution is the understanding that current anti-spo...
Markus Jakobsson, Hossein Siadati
BIRTHDAY
2016
Springer
8 years 7 months ago
Moessner's Theorem: An Exercise in Coinductive Reasoning in Coq
Moessner’s Theorem describes a construction of the sequence of powers (1n , 2n , 3n , . . . ), by repeatedly dropping and summing elements from the sequence of positive natural n...
Robbert Krebbers, Louis Parlant, Alexandra Silva
BIRTHDAY
2016
Springer
8 years 7 months ago
Guards, Failure, and Partiality: Dijkstra's Guarded-Command Language Formulated Topologically
Existing treatments of Dijkstra’s guarded-command language treat divergence and failure as equivalent, even though Dijkstra clearly states they are not. We reexamine Dijkstra’s...
David A. Schmidt