×

Found 77 Documents (Results 1–77)

Improved side-channel analysis of finite-field multiplication. (English) Zbl 1380.94073

Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 395-415 (2015).
MSC:  94A60 68M07
PDFBibTeX XMLCite
Full Text: DOI

Key-recovery attacks on \(\mathsf {ASASA}\). (English) Zbl 1375.94150

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 3-27 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Higher-order differential meet-in-the-middle preimage attacks on SHA-1 and BLAKE. (English) Zbl 1375.94123

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 683-701 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Cryptanalysis of the co-ACD assumption. (English) Zbl 1375.94124

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 561-580 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An improved BKW algorithm for LWE with applications to cryptography and lattices. (English) Zbl 1336.94058

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 43-62 (2015).
MSC:  94A60 68W30
PDFBibTeX XMLCite
Full Text: DOI arXiv

Verified proofs of higher-order masking. (English) Zbl 1370.94486

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 457-485 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Diffusion matrices from algebraic-geometry codes with efficient SIMD implementation. (English) Zbl 1382.94055

Joux, Antoine (ed.) et al., Selected areas in cryptography – SAC 2014. 21st international conference, Montreal, QC, Canada, August 14–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 243-260 (2014).
MSC:  94A60 94B27
PDFBibTeX XMLCite
Full Text: DOI

Binary elligator squared. (English) Zbl 1366.94473

Joux, Antoine (ed.) et al., Selected areas in cryptography – SAC 2014. 21st international conference, Montreal, QC, Canada, August 14–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 20-37 (2014).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI HAL

Exhausting Dmirci-Selçuk meet-in-the-middle attacks against reduced-round AES. (English) Zbl 1321.94053

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 541-560 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks. (English) Zbl 1321.94058

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 502-517 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Making RSA-PSS provably secure against non-random faults. (English) Zbl 1375.94098

Batina, Lejla (ed.) et al., Cryptographic hardware and embedded systems – CHES 2014. 16th international workshop, Busan, South Korea, September 23–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-662-44708-6/pbk). Lecture Notes in Computer Science 8731, 206-222 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-user collisions: applications to discrete logarithm, Even-Mansour and PRINCE. (English) Zbl 1306.94053

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 420-438 (2014).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias. (English) Zbl 1306.94023

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 262-281 (2014).
MSC:  94A60 14G50 94A62
PDFBibTeX XMLCite
Full Text: DOI

Side-channel analysis of multiplications in \(\mathrm{GF}(2^{128})\). Application to AES-GCM. (English) Zbl 1317.94083

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 306-325 (2014).
MSC:  94A60 94A62 11T71
PDFBibTeX XMLCite
Full Text: DOI

Statistical properties of short RSA distribution and their cryptographic applications. (English) Zbl 1425.94059

Cai, Zhipeng (ed.) et al., Computing and combinatorics. 20th international conference, COCOON 2014, Atlanta, GA, USA, August 4–6, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8591, 525-536 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Close to uniform prime number generation with fewer random bits. (English) Zbl 1414.11165

Esparza, Javier (ed.) et al., Automata, languages, and programming. 41st international colloquium, ICALP 2014, Copenhagen, Denmark, July 8–11, 2014. Proceedings, Part I. Berlin: Springer. Lect. Notes Comput. Sci. 8572, 991-1002 (2014).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Security amplification against meet-in-the-middle attacks using whitening. (English) Zbl 1317.94105

Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 252-269 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI HAL

Recovering private keys generated with weak PRNGs. (English) Zbl 1317.94106

Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 158-172 (2013).
MSC:  94A60 65C10
PDFBibTeX XMLCite
Full Text: DOI HAL

Leakage-resilient symmetric encryption via re-keying. (English) Zbl 1353.94029

Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems – CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 471-488 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Structural evaluation of AES and chosen-key distinguisher of 9-round AES-128. (English) Zbl 1310.94144

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 183-203 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Injective encodings to elliptic curves. (English) Zbl 1316.94072

Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1–3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 203-218 (2013).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI HAL

Time/memory/data tradeoffs for variants of the RSA problem. (English) Zbl 1382.94104

Du, Ding-Zhu (ed.) et al., Computing and combinatorics. 19th international conference, COCOON 2013, Hangzhou, China, June 21–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38767-8/pbk). Lecture Notes in Computer Science 7936, 651-662 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Improved key recovery attacks on reduced-round AES in the single-key setting. (English) Zbl 1306.94044

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 371-387 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Graph-theoretic algorithms for the “isomorphism of polynomials” problem. (English) Zbl 1306.94034

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 211-227 (2013).
MSC:  94A60 05C85
PDFBibTeX XMLCite
Full Text: DOI

Timing attack against protected RSA-CRT implementation used in PolarSSL. (English) Zbl 1312.94029

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 18-33 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Faster chosen-key distinguishers on reduced-round AES. (English) Zbl 1295.94051

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 225-243 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Meet-in-the-middle attack on reduced versions of the Camellia block cipher. (English) Zbl 1279.94097

Hanaoka, Goichiro (ed.) et al., Advances in information and computer security. 7th international workshop on security, IWSEC 2012, Fukuoka, Japan, November 7–9, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34116-8/pbk). Lecture Notes in Computer Science 7631, 197-215 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI HAL

Attacking RSA-CRT signatures with faults on Montgomery multiplication. (English) Zbl 1294.94094

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 447-462 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Indifferentiable hashing to Barreto-Naehrig curves. (English) Zbl 1303.94080

Hevia, Alejandro (ed.) et al., Progress in cryptology – LATINCRYPT 2012. 2nd international conference on cryptology and information security in Latin America, Santiago, Chile, October 7–10, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33480-1/pbk). Lecture Notes in Computer Science 7533, 1-17 (2012).
MSC:  94A60 14G50 68P25
PDFBibTeX XMLCite
Full Text: DOI

Tightly-secure signatures from lossy identification schemes. (English) Zbl 1297.94115

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 572-590 (2012).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

New insights on impossible differential cryptanalysis. (English) Zbl 1292.94037

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 243-259 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical key-recovery for all possible parameters of SFLASH. (English) Zbl 1227.94072

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 667-685 (2011).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Automatic search of attacks on round-reduced AES and applications. (English) Zbl 1287.94056

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 169-187 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical near-collisions and collisions on round-reduced ECHO-256 compression function. (English) Zbl 1282.94047

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 107-127 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Practical cryptanalysis of the identification scheme based on the isomorphism of polynomial with one secret problem. (English) Zbl 1291.94062

Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 473-493 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security analysis of SIMD. (English) Zbl 1293.94057

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 351-368 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Attacks on hash functions based on Generalized Feistel: application to reduced-round Lesamnta and SHAvite-3\(_{512}\). (English) Zbl 1290.94047

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 18-35 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Deterministic encoding and hashing to odd hyperelliptic curves. (English) Zbl 1290.94073

Joye, Marc (ed.) et al., Pairing-based cryptography – Pairing 2010. 4th international conference, Yamanaka Hot Spring, Japan, December 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17454-4/pbk). Lecture Notes in Computer Science 6487, 265-277 (2010).
MSC:  94A60 11T71 14G50
PDFBibTeX XMLCite
Full Text: DOI

Estimating the size of the image of deterministic hash functions to elliptic curves. (English) Zbl 1285.94060

Abdalla, Michel (ed.) et al., Progress in cryptology – LATINCRYPT 2010. First international conference on cryptology and information security in Latin America, Puebla, Mexico, August 8–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14711-1/pbk). Lecture Notes in Computer Science 6212, 81-91 (2010).
MSC:  94A60 14Q05 11G20
PDFBibTeX XMLCite
Full Text: DOI Link

Another look at complementation properties. (English) Zbl 1279.94055

Hong, Seokhie (ed.) et al., Fast software encryption. 17th international workshop, FSE 2010, Seoul, Korea, February 7–10, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-13857-7/pbk). Lecture Notes in Computer Science 6147, 347-364 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

On some incompatible properties of voting schemes. (English) Zbl 1284.68242

Chaum, David (ed.) et al., Towards trustworthy elections. New directions in electronic voting. Berlin: Springer (ISBN 978-3-642-12979-7/pbk). Lecture Notes in Computer Science 6000, 191-199 (2010).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Analysis of the collision resistance of RadioGatún using algebraic techniques. (English) Zbl 1256.94045

Avanzi, Roberto Maria (ed.) et al., Selected areas in cryptography. 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14–15. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04158-7/pbk). Lecture Notes in Computer Science 5381, 245-261 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of tweaked versions of SMASH and reparation. (English) Zbl 1256.94050

Avanzi, Roberto Maria (ed.) et al., Selected areas in cryptography. 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14–15. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04158-7/pbk). Lecture Notes in Computer Science 5381, 136-150 (2009).
MSC:  94A60 68Q25
PDFBibTeX XMLCite
Full Text: DOI

Applied cryptography and network security. 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2–5, 2009. Proceedings. (English) Zbl 1163.94301

Lecture Notes in Computer Science 5536. Berlin: Springer (ISBN 978-3-642-01956-2/pbk). xiii, 535 p. (2009).
PDFBibTeX XMLCite
Full Text: DOI

Optimal randomness extraction from a Diffie-Hellman element. (English) Zbl 1239.94043

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 572-589 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of a hash function based on quasi-cyclic codes. (English) Zbl 1159.94360

Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 19-35 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Second preimage attacks on dithered hash functions. (English) Zbl 1149.94302

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 270-288 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Key recovery on hidden monomial multivariate schemes. (English) Zbl 1149.94313

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 19-30 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Total break of the \(\ell \)-IC signature scheme. (English) Zbl 1162.94357

Cramer, Ronald (ed.), Public key cryptography – PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78440-1/pbk). Lecture Notes in Computer Science 4939, 1-17 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Full key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5. (English) Zbl 1215.94046

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 13-30 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical cryptanalysis of SFLASH. (English) Zbl 1215.94043

Menezes, Alfred (ed.), Advances in cryptology – CRYPTO 2007. 27th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-74142-8/pbk). Lecture Notes in Computer Science 4622, 1-12 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of SFLASH with slightly modified parameters. (English) Zbl 1141.94351

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 264-275 (2007).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

An improved LPN algorithm. (English) Zbl 1152.94434

De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6–8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 348-359 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Power attack on small RSA public exponent. (English) Zbl 1352.94035

Goubin, Louis (ed.) et al., Cryptographic hardware and embedded systems – CHES 2006. 8th international workshop, Yokohama, Japan, October 10–13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-46559-1/pbk). Lecture Notes in Computer Science 4249, 339-353 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hardness of distinguishing the MSB or LSB of secret keys in Diffie-Hellman schemes. (English) Zbl 1133.94317

Bugliesi, Michele (ed.) et al., Automata, languages and programming. 33rd international colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-35907-4/pbk). Lecture Notes in Computer Science 4052, 240-251 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

The twist-aUgmented technique for key exchange. (English) Zbl 1151.94495

Yung, Moti (ed.) et al., Public key cryptography – PKC 2006. 9th international conference on theory and practice of public-key cryptography, New York, NY, USA, April 24–26, 2006. Proceedings. Berlin: Springer (ISBN 3-540-33851-9/pbk). Lecture Notes in Computer Science 3958, 410-426 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Differential cryptanalysis for multivariate schemes. (English) Zbl 1137.94344

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 341-353 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A simple threshold authenticated key exchange from short secrets. (English) Zbl 1154.94446

Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 566-584 (2005).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Blockwise adversarial model for on-line ciphers and symmetric encryption schemes. (English) Zbl 1117.94318

Handschuh, Helena (ed.) et al., Selected areas in cryptography. 11th international workshop, SAC 2004, Waterloo, Canada, August 9–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24327-5/pbk). Lecture Notes in Computer Science 3357, 212-226 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Password-based authenticated key exchange in the three-party setting. (English) Zbl 1081.94513

Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 65-84 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Authenticated on-line encryption. (English) Zbl 1081.94523

Matsui, Mitsuru (ed.) et al., Selected areas in cryptography. 10th annual international workshop, SAC 2003, Ottawa, Canada, August 14–15, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21370-8/pbk). Lecture Notes in Computer Science 3006, 145-159 (2004).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Defeating countermeasures based on randomized BSD representations. (English) Zbl 1104.68472

Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 312-327 (2004).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

The doubling attack – why upwards is better than downwards. (English) Zbl 1274.94066

Walter, Colin D. (ed.) et al., Cryptographic hardware and embedded systems – CHES 2003. 5th international workshop, Cologne, Germany, September 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40833-9/pbk). Lect. Notes Comput. Sci. 2779, 269-280 (2003).
MSC:  94A60 11Y16
PDFBibTeX XMLCite
Full Text: DOI

Attacking unbalanced RSA-CRT using SPA. (English) Zbl 1274.94065

Walter, Colin D. (ed.) et al., Cryptographic hardware and embedded systems – CHES 2003. 5th international workshop, Cologne, Germany, September 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40833-9/pbk). Lect. Notes Comput. Sci. 2779, 254-268 (2003).
MSC:  94A60 11Y16
PDFBibTeX XMLCite
Full Text: DOI

Practical symmetric on-line encryption. (English) Zbl 1254.94029

Johansson, Thomas (ed.), Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24–26, 2003. Revised papers. Berlin: Springer (ISBN 3-540-20449-0/pbk). Lect. Notes Comput. Sci. 2887, 362-375 (2003).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

The insecurity of Esign in practical implementations. (English) Zbl 1205.94083

Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 492-506 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security of RDSA. (English) Zbl 1038.94555

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 462-476 (2003).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: Link

Practical multi-candidate election system. (English) Zbl 1333.94030

Proceedings of the 20th annual ACM symposium on principles of distributed computing, PODC ’01, Newport, RI, USA, August 26–28, 2001. New York, NY: Association for Computing Machinery (ACM) (ISBN 1-58113-383-9). 274-283 (2001).
MSC:  94A60 68M14
PDFBibTeX XMLCite
Full Text: DOI Link

Threshold cryptosystems secure against chosen-ciphertext attacks. (English) Zbl 1064.94545

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 351-368 (2001).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

Fully distributed threshold RSA under standard assumptions. (English) Zbl 1067.94531

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 310-330 (2001).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

One round threshold discrete-log key generation without private channels. (English) Zbl 0992.94506

Kim, Kwangjo (ed.), Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13-15, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1992, 300-316 (2001).
MSC:  94A60
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software