Sciweavers

4 search results - page 1 / 1
» Scalable PP-1 block cipher
Sort
View
AMCS
2010
172views Mathematics» more  AMCS 2010»
13 years 5 months ago
Scalable PP-1 block cipher
Krzysztof Bucholc, Krzysztof Chmiel, Anna Grochole...
NCA
2005
IEEE
13 years 11 months ago
Leveraging the Multiprocessing Capabilities of Modern Network Processors for Cryptographic Acceleration
The Kasumi block cipher provides integrity and confidentiality services for 3G wireless networks, but it also forms a bottleneck due to its computational overhead. Especially in ...
Gunnar Gaubatz, Berk Sunar
CHES
2009
Springer
265views Cryptology» more  CHES 2009»
14 years 5 months ago
Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers
Differential Power Analysis (DPA) is a powerful side channel key recovery attack that efficiently breaks block ciphers implementations. In software, two main techniques are usually...
Matthieu Rivain, Emmanuel Prouff, Julien Doget
TCOS
2010
13 years 12 hour ago
PET SNAKE: A Special Purpose Architecture to Implement an Algebraic Attack in Hardware
Abstract. In [24] Raddum and Semaev propose a technique to solve systems of polynomial equations over F2 as occurring in algebraic attacks on block ciphers. This approach is known ...
Willi Geiselmann, Kenneth Matheis, Rainer Steinwan...