Sciweavers

Share
14 search results - page 1 / 3
» ivs 2016
Sort
View
IACR
2016
60views Biometrics» more  IACR 2016»
4 years 3 months ago
Fault analysis and weak key-IV attack on Sprout
:- Armknecht and Mikhalev proposed a new stream cipher ‘Sprout’ based on the design specification of the stream cipher, Grain-128a. Sprout has shorter state size than Grain fa...
Dibyendu Roy, Sourav Mukhopadhyay
IACR
2016
50views Biometrics» more  IACR 2016»
4 years 3 months ago
A Practical Template Attack on MICKEY-128 2.0 Using PSO Generated IVs and LS-SVM
—The reported power analysis attacks on hardware implementations of the MICKEY family of streams ciphers require a large number of power traces. The primary motivation of our wor...
Abhishek Chakraborty, Debdeep Mukhopadhyay
IVS
2016
4 years 3 months ago
On the effective visualisation of dynamic attribute cascades
Cascades appear in many applications, including biological graphs and social media analysis. In a cascade, a dynamic attribute propagates through a graph, following its edges. We ...
Daniel Archambault, Helen C. Purchase
IVS
2016
4 years 3 months ago
Explaining three-dimensional dimensionality reduction plots
Understanding three-dimensional projections created by dimensionality reduction from high-variate datasets is very challenging. In particular, classical three-dimensional scatterp...
Danilo Barbosa Coimbra, Rafael Messias Martins, T&...
IACR
2016
45views Biometrics» more  IACR 2016»
4 years 3 months ago
Cryptanalysis of the Full Spritz Stream Cipher
Spritz is a stream cipher proposed by Rivest and Schuldt at the rump session of CRYPTO 2014. It is intended to be a replacement of the popular RC4 stream cipher. In this paper we p...
Subhadeep Banik, Takanori Isobe
books