Sciweavers

31 search results - page 1 / 7
» Practical Key-recovery For All Possible Parameters of SFLASH
Sort
View
IACR
2011
94views more  IACR 2011»
12 years 4 months ago
Practical Key-recovery For All Possible Parameters of SFLASH
In this paper we present a new practical key-recovery attack on the SFLASH signature scheme. SFLASH is a derivative of the older C∗ encryption and signature scheme that was broke...
Charles Bouillaguet, Pierre-Alain Fouque, Gilles M...
PKC
2009
Springer
102views Cryptology» more  PKC 2009»
14 years 5 months ago
A Practical Key Recovery Attack on Basic TCHo
TCHo is a public key encryption scheme based on a stream cipher component, which is particular suitable for low cost devices like RFIDs. In its basic version, TCHo offers no IND-CC...
Mathias Herrmann, Gregor Leander
PKC
2007
Springer
219views Cryptology» more  PKC 2007»
13 years 11 months ago
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003
At PKC 2003 Paeng, Jung, and Ha proposed a lattice based public key cryptosystem(PJH). It is originated from GGH, and designed as a hybrid of GGH and NTRUEncrypt in order to reduce...
Daewan Han, Myung-Hwan Kim, Yongjin Yeom
PKC
2011
Springer
197views Cryptology» more  PKC 2011»
12 years 7 months ago
Cryptanalysis of Multivariate and Odd-Characteristic HFE Variants
We investigate the security of a generalization of HFE (multivariate and odd-characteristic variants). First, we propose an improved version of the basic Kipnis-Shamir key recovery...
Luk Bettale, Jean-Charles Faugère, Ludovic ...
CDC
2009
IEEE
231views Control Systems» more  CDC 2009»
13 years 9 months ago
Design of observer-based controllers for LPV systems with unknown parameters
— Output-based feedback control of LPV systems is an important problem, as in practice it is rarely the case that the full state variable is available for feedback. In this paper...
W. P. M. H. Heemels, Jamal Daafouz, Gilles Milleri...