Sciweavers

37 search results - page 2 / 8
» fse 2007
Sort
View
FSE
2007
Springer
140views Cryptology» more  FSE 2007»
13 years 11 months ago
An Analytical Model for Time-Driven Cache Attacks
Kris Tiri, Onur Aciiçmez, Michael Neve, Fle...
FSE
2007
Springer
152views Cryptology» more  FSE 2007»
13 years 11 months ago
The 128-Bit Blockcipher CLEFIA (Extended Abstract)
Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shih...
FSE
2007
Springer
153views Cryptology» more  FSE 2007»
13 years 11 months ago
A New Attack on 6-Round IDEA
IDEA is a 64-bit block cipher with 128-bit keys introduced
Eli Biham, Orr Dunkelman, Nathan Keller
FSE
2007
Springer
263views Cryptology» more  FSE 2007»
13 years 11 months ago
Bad and Good Ways of Post-processing Biased Physical Random Numbers
Algorithmic post-processing is used to overcome statistical deficiencies of physical random number generators. We show that the quasigroup based approach for post-processing rando...
Markus Dichtl
FSE
2007
Springer
128views Cryptology» more  FSE 2007»
13 years 8 months ago
Differential-Linear Attacks Against the Stream Cipher Phelix
The previous key recovery attacks against Helix obtain the key with about 288 operations using chosen nonces (reusing nonce) and about 1000 adaptively chosen plaintext words (or 23...
Hongjun Wu, Bart Preneel