×

Found 27 Documents (Results 1–27)

On constructions of involutory MDS matrices. (English) Zbl 1312.94038

Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 43-60 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

GPU-based implementation of 128-bit secure eta pairing over a binary field. (English) Zbl 1312.94034

Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 26-42 (2013).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Differential fault analysis of Twofish. (English) Zbl 1311.94066

Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 10-28 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of PRESENT-like ciphers with secret S-boxes. (English) Zbl 1307.94038

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 270-289 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Search for related-key differential characteristics in DES-like ciphers. (English) Zbl 1282.94033

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 18-34 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential cryptanalysis of round-reduced printcipher: computing roots of permutations. (English) Zbl 1282.94029

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 1-17 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The differential analysis of S-functions. (English) Zbl 1290.94112

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 36-56 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of a generic class of white-box implementations. (English) Zbl 1256.94058

Avanzi, Roberto Maria (ed.) et al., Selected areas in cryptography. 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14–15. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04158-7/pbk). Lecture Notes in Computer Science 5381, 414-428 (2009).
MSC:  94A60 94-04
PDFBibTeX XMLCite
Full Text: DOI

On Feistel structures using a diffusion switching mechanism. (English) Zbl 1234.94066

Robshaw, Matthew (ed.), Fast software encryption. 13th international workshop, FSE 2006, Graz, Austria, March 15–17, 2006. Revised selected papers. Berlin: Springer (ISBN 3-540-36597-4/pbk). Lecture Notes in Computer Science 4047, 41-56 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new simple technique to attack filter generators and related ciphers. (English) Zbl 1117.94317

Handschuh, Helena (ed.) et al., Selected areas in cryptography. 11th international workshop, SAC 2004, Waterloo, Canada, August 9–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24327-5/pbk). Lecture Notes in Computer Science 3357, 39-53 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On Feistel ciphers using optimal diffusion mappings across multiple rounds. (English) Zbl 1094.94036

Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 1-15 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On Boolean and arithmetic masking against differential power analysis. (English) Zbl 0998.94537

Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2000. 2nd international workshop, Worcester, MA, USA, August 17-18, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1965, 231-237 (2000).
MSC:  94A60 94C10
PDFBibTeX XMLCite

A comparative study of performance of AES final candidates using FPGAs. (English) Zbl 0998.68663

Koç, Çetin K. (ed.) et al., Cryptographic hardware and embedded systems - CHES 2000. 2nd international workshop, Worcester, MA, USA, August 17-18, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1965, 125-140 (2000).
MSC:  68U99 68P25 94A60
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software