Sciweavers

16 search results - page 2 / 4
» ctrsa 2010
Sort
View
CTRSA
2010
Springer
216views Cryptology» more  CTRSA 2010»
13 years 11 months ago
Speed Records for NTRU
In this paper NTRUEncrypt is implemented for the first time on a GPU using the CUDA platform. As is shown, this operation lends itself excellently for parallelization and performs...
Jens Hermans, Frederik Vercauteren, Bart Preneel
CTRSA
2010
Springer
257views Cryptology» more  CTRSA 2010»
13 years 11 months ago
Practical Key Recovery Attack against Secret-IV Edon-
Abstract. The SHA-3 competition has been organized by NIST to select a new hashing standard. Edon-R was one of the fastest candidates in the first round of the competition. In thi...
Gaëtan Leurent
CTRSA
2010
Springer
149views Cryptology» more  CTRSA 2010»
13 years 11 months ago
Usable Optimistic Fair Exchange
Fairly exchanging digital content is an everyday problem. It has been shown that fair exchange cannot be done without a trusted third party (called the Arbiter). Yet, even with a ...
Alptekin Küpçü, Anna Lysyanskaya
CTRSA
2010
Springer
189views Cryptology» more  CTRSA 2010»
13 years 11 months ago
Linear Cryptanalysis of Reduced-Round PRESENT
Abstract. PRESENT is a hardware-oriented block cipher suitable for resource constrained environment. In this paper we analyze PRESENT by the multidimensional linear cryptanalysis m...
Joo Yeon Cho
CTRSA
2010
Springer
172views Cryptology» more  CTRSA 2010»
13 years 11 months ago
Revisiting Higher-Order DPA Attacks:
Security devices are vulnerable to side-channel attacks that perform statistical analysis on data leaked from cryptographic computations. Higher-order (HO) attacks are a powerful a...
Benedikt Gierlichs, Lejla Batina, Bart Preneel, In...