Sciweavers

CRYPTO
2009
Springer
103views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures
Jean-Sébastien Coron, David Naccache, Mehdi...
CRYPTO
2009
Springer
99views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Cryptanalysis of C2
Abstract Julia Borghoff , Lars R. Knudsen, Gregor Leander, Krystian Matusiewicz Department of Mathematics Technical University of Denmark
Julia Borghoff, Lars R. Knudsen, Gregor Leander, K...
CRYPTO
2009
Springer
106views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
The Group of Signed Quadratic Residues and Applications
Dennis Hofheinz, Eike Kiltz
CRYPTO
2009
Springer
111views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Distinguisher and Related-Key Attack on the Full AES-256
Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
CRYPTO
2009
Springer
82views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Solving Hidden Number Problem with One Bit Oracle and Advice
In the Hidden Number Problem (HNP), the goal is to find a hidden number s, when given p, g and access to an oracle that on query a returns the k most significant bits of s · ga ...
Adi Akavia
CRYPTO
2009
Springer
119views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate
Marc Stevens, Alexander Sotirov, Jacob Appelbaum, ...
CRYPTO
2009
Springer
98views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Probabilistically Checkable Arguments
Yael Tauman Kalai, Ran Raz