Sciweavers

9 search results - page 1 / 2
» Why Provable Security Matters
Sort
View
EUROCRYPT
2003
Springer
13 years 10 months ago
Why Provable Security Matters?
Abstract. Recently, methods from provable security, that had been developped for the last twenty years within the research community, have been extensively used to support emerging...
Jacques Stern
CHES
2009
Springer
239views Cryptology» more  CHES 2009»
14 years 5 months ago
Algebraic Side-Channel Attacks on the AES: Why Time also Matters in DPA
Algebraic side-channel attacks have been recently introduced as a powerful cryptanalysis technique against block ciphers. These attacks represent both a target algorithm and its ph...
François-Xavier Standaert, Mathieu Renauld,...
JOC
2007
169views more  JOC 2007»
13 years 4 months ago
Another Look at "Provable Security"
We give an informal analysis and critique of several typical “provable security” results. In some cases there are intuitive but convincing arguments for rejecting the conclusi...
Neal Koblitz, Alfred Menezes
SMI
2005
IEEE
109views Image Analysis» more  SMI 2005»
13 years 10 months ago
Practical Spherical Embedding of Manifold Triangle Meshes
Gotsman et al. (SIGGRAPH 2003) presented the first method to generate a provably bijective parameterization of a closed genus-0 manifold mesh to the unit sphere. This involves the...
Shadi Saba, Irad Yavneh, Craig Gotsman, Alla Sheff...
SP
2009
IEEE
122views Security Privacy» more  SP 2009»
13 years 11 months ago
Plaintext Recovery Attacks against SSH
This paper presents a variety of plaintext-recovering attacks against SSH. We implemented a proof of concept of our attacks against OpenSSH, where we can verifiably recover 14 bi...
Martin R. Albrecht, Kenneth G. Paterson, Gaven J. ...