Sciweavers

CTRSA
2007
Springer
111views Cryptology» more  CTRSA 2007»
13 years 11 months ago
A Practical and Tightly Secure Signature Scheme Without Hash Function
In 1999, two signature schemes based on the flexible RSA problem (a.k.a. strong RSA problem) were independently introduced: the Gennaro-Halevi-Rabin (GHR) signature scheme and the...
Benoît Chevallier-Mames, Marc Joye
CTRSA
2007
Springer
119views Cryptology» more  CTRSA 2007»
13 years 11 months ago
A Simple Related-Key Attack on the Full SHACAL-1
SHACAL-1 is a 160-bit block cipher with variable key length
Eli Biham, Orr Dunkelman, Nathan Keller
CTRSA
2007
Springer
161views Cryptology» more  CTRSA 2007»
13 years 11 months ago
Cache Based Remote Timing Attack on the AES
We introduce a new robust cache-based timing attack on AES. We present experiments and concrete evidence that our attack can be used to obtain secret keys of remote cryptosystems i...
Onur Aciiçmez, Werner Schindler, Çet...
CTRSA
2007
Springer
111views Cryptology» more  CTRSA 2007»
13 years 11 months ago
Predicting Secret Keys Via Branch Prediction
This paper announces a new software side-channel attack — enabled by the branch prediction capability common to all modern highperformance CPUs. The penalty paid (extra clock cyc...
Onur Aciiçmez, Çetin Kaya Koç...
CTRSA
2007
Springer
112views Cryptology» more  CTRSA 2007»
13 years 11 months ago
Directed Transitive Signature Scheme
In 2002, Micali and Rivest raised an open problem as to whether directed transitive signatures exist or not. In 2003, Hohenberger formalized the necessary mathematical criteria for...
Xun Yi