Sciweavers

Share
12 search results - page 1 / 3
» sacrypt 2005
Sort
View
SACRYPT
2005
Springer
10 years 10 months ago
Fault Attacks on Combiners with Memory
Frederik Armknecht, Willi Meier
SACRYPT
2005
Springer
125views Cryptology» more  SACRYPT 2005»
10 years 10 months ago
Breaking a New Hash Function Design Strategy Called SMASH
Norbert Pramstaller, Christian Rechberger, Vincent...
SACRYPT
2005
Springer
10 years 10 months ago
Impact of Rotations in SHA-1 and Related Hash Functions
Norbert Pramstaller, Christian Rechberger, Vincent...
SACRYPT
2005
Springer
146views Cryptology» more  SACRYPT 2005»
10 years 10 months ago
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security
In a hierarchical structure, an entity has access to another if and only if the former is a superior of the later. The access control scheme for a hierarchy represented by a partia...
Jiang Wu, Ruizhong Wei
SACRYPT
2005
Springer
10 years 10 months ago
SPA Resistant Left-to-Right Integer Recodings
We present two left-to-right integer recodings which can be used to perform scalar multiplication with a fixed sequence of operations. These recodings make it possible to have a s...
Nicolas Thériault
books