Sciweavers

CTRSA
2009
Springer
127views Cryptology» more  CTRSA 2009»
13 years 11 months ago
Securing RSA against Fault Analysis by Double Addition Chain Exponentiation
Abstract. Fault Analysis is a powerful cryptanalytic technique that enables to break cryptographic implementations embedded in portable devices more efficiently than any other tech...
Matthieu Rivain
AFRICACRYPT
2009
Springer
13 years 11 months ago
Unifying Zero-Knowledge Proofs of Knowledge
Abstract. We present a simple zero-knowledge proof of knowledge protocol of which many protocols in the literature are instantiations. These include Schnorr’s protocol for provin...
Ueli M. Maurer
AFRICACRYPT
2009
Springer
13 years 11 months ago
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps
We propose a generic modelling technique that can be used to extend existing frameworks for theoretical security analysis in order to capture the use of timestamps. We apply this t...
Manuel Barbosa, Pooya Farshim
AFRICACRYPT
2009
Springer
13 years 11 months ago
Cryptanalysis of Vortex
Vortex is a hash function that was first presented at ISC’2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on b...
Jean-Philippe Aumasson, Orr Dunkelman, Florian Men...
AFRICACRYPT
2009
Springer
13 years 11 months ago
Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems
Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini
AFRICACRYPT
2009
Springer
13 years 11 months ago
Reducing Key Length of the McEliece Cryptosystem
Thierry P. Berger, Pierre-Louis Cayrel, Philippe G...
AFRICACRYPT
2009
Springer
13 years 11 months ago
Cryptanalysis of RSA Using the Ratio of the Primes
Abderrahmane Nitaj
AFRICACRYPT
2009
Springer
13 years 11 months ago
Generic Attacks on Feistel Networks with Internal Permutations
Joana Treger, Jacques Patarin
AFRICACRYPT
2009
Springer
13 years 11 months ago
On Modular Decomposition of Integers
Billy Bob Brumley, Kaisa Nyberg
AFRICACRYPT
2009
Springer
13 years 11 months ago
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed
We present the first simple power analysis (SPA) of software implementations of KeeLoq. Our attack drastically reduces the efforts required for a complete break of remote keyless...
Markus Kasper, Timo Kasper, Amir Moradi, Christof ...