Sciweavers

15 search results - page 1 / 3
» icisc 2004
Sort
View
ICISC
2004
110views Cryptology» more  ICISC 2004»
13 years 6 months ago
All in the XL Family: Theory and Practice
Abstract. The XL (eXtended Linearization) equation-solving algorithm belongs to the same extended family as the advanced Gr
Bo-Yin Yang, Jiun-Ming Chen
ICISC
2004
120views Cryptology» more  ICISC 2004»
13 years 6 months ago
Algebraic Attacks on Combiners with Memory and Several Outputs
Algebraic attacks on stream ciphers [14] recover the key by solving an overdefined system of multivariate equations. Such attacks can break several interesting cases of LFSR-based ...
Nicolas Courtois
ICISC
2004
99views Cryptology» more  ICISC 2004»
13 years 6 months ago
Fractional Windows Revisited: Improved Signed-Digit Representations for Efficient Exponentiation
Abstract. This paper extends results concerning efficient exponentiation in groups where inversion is easy (e.g. in elliptic curve cryptography). It examines the right-to-left and ...
Bodo Möller
ICISC
2004
122views Cryptology» more  ICISC 2004»
13 years 6 months ago
Steganography for Executables and Code Transformation Signatures
Steganography embeds a secret message in an innocuous cover-object. This paper identifies three cover-specific redundancies of executable programs and presents steganographic techn...
Bertrand Anckaert, Bjorn De Sutter, Dominique Chan...