Sciweavers

9 search results - page 1 / 2
» ima 2005
Sort
View
IMA
2005
Springer
82views Cryptology» more  IMA 2005»
13 years 10 months ago
Hash Based Digital Signature Schemes
C. Dods, Nigel P. Smart, Martijn Stam
IMA
2005
Springer
113views Cryptology» more  IMA 2005»
13 years 10 months ago
Exploiting Coding Theory for Collision Attacks on SHA-1
In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly focus
Norbert Pramstaller, Christian Rechberger, Vincent...
IMA
2005
Springer
52views Cryptology» more  IMA 2005»
13 years 10 months ago
Domain Expansion of MACs: Alternative Uses of the FIL-MAC
In this paper, a study of a paradigm for domain expansion of MACs is generalized. In particular, a tradeoff between the efficiency of a MAC and the tightness of its security reduc...
Ueli M. Maurer, Johan Sjödin
IMA
2005
Springer
111views Cryptology» more  IMA 2005»
13 years 10 months ago
An Algebraic Framework for Cipher Embeddings
In this paper we discuss the idea of block cipher embeddings and consider a natural algebraic framework for such constructions. In this approach we regard block cipher state spaces...
Carlos Cid, Sean Murphy, Matthew J. B. Robshaw
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
13 years 10 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page