Sciweavers

378 search results - page 2 / 76
» A Traceable Block Cipher
Sort
View
BIRTHDAY
2012
Springer
12 years 21 days ago
Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the intersection between One-Time Programs and Boolean masking schemes. First, we show t...
François-Xavier Standaert, Christophe Petit...
PROVSEC
2007
Springer
13 years 11 months ago
On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers
Security of a modern block cipher is commonly measured in terms of its resistance to known attacks. While the provable security approach to block ciphers dates back to the first C...
Ermaliza Razali, Raphael C.-W. Phan, Marc Joye
ISW
2007
Springer
13 years 11 months ago
The Security of Elastic Block Ciphers Against Key-Recovery Attacks
We analyze the security of elastic block ciphers against key-recovery attacks. An elastic version of a fixed-length block cipher is a variable-length block cipher that supports an...
Debra L. Cook, Moti Yung, Angelos D. Keromytis
IMA
2005
Springer
111views Cryptology» more  IMA 2005»
13 years 10 months ago
An Algebraic Framework for Cipher Embeddings
In this paper we discuss the idea of block cipher embeddings and consider a natural algebraic framework for such constructions. In this approach we regard block cipher state spaces...
Carlos Cid, Sean Murphy, Matthew J. B. Robshaw
CRYPTO
1998
Springer
137views Cryptology» more  CRYPTO 1998»
13 years 9 months ago
Building PRFs from PRPs
Abstract. We evaluate constructions for building pseudo-random functions (PRFs) from pseudo-random permutations (PRPs). We present two constructions: a slower construction which pr...
Chris Hall, David Wagner, John Kelsey, Bruce Schne...