Sciweavers

59 search results - page 2 / 12
» Key-Recovery Attacks on ASASA
Sort
View
EUROCRYPT
2009
Springer
14 years 6 months ago
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks
The fair evaluation and comparison of side-channel attacks and countermeasures has been a long standing open question, limiting further developments in the field. Motivated by this...
François-Xavier Standaert, Moti Yung, Tal M...
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
14 years 15 days ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
PKC
2009
Springer
102views Cryptology» more  PKC 2009»
14 years 6 months ago
A Practical Key Recovery Attack on Basic TCHo
TCHo is a public key encryption scheme based on a stream cipher component, which is particular suitable for low cost devices like RFIDs. In its basic version, TCHo offers no IND-CC...
Mathias Herrmann, Gregor Leander
ISW
2007
Springer
13 years 11 months ago
The Security of Elastic Block Ciphers Against Key-Recovery Attacks
We analyze the security of elastic block ciphers against key-recovery attacks. An elastic version of a fixed-length block cipher is a variable-length block cipher that supports an...
Debra L. Cook, Moti Yung, Angelos D. Keromytis
CRYPTO
2007
Springer
104views Cryptology» more  CRYPTO 2007»
13 years 12 months ago
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
At Crypto ’06, Bellare presented new security proofs for HMAC and NMAC, under the assumption that the underlying compression function is a pseudo-random function family. Converse...
Pierre-Alain Fouque, Gaëtan Leurent, Phong Q....