Sciweavers

17 search results - page 4 / 4
» Algebraic Cryptanalysis of the Data Encryption Standard
Sort
View
130
Voted
VTC
2008
IEEE
129views Communications» more  VTC 2008»
15 years 10 months ago
On Parallelizing the CryptMT Stream Cipher
Abstract—Fast stream ciphers are used extensively for encrypted data transmission in mobile networks and over multigigabit links. CryptMT, a recently proposed stream cipher, is o...
Deian Stefan, David B. Nummey, Jared Harwayne-Gida...
143
Voted
CCS
2010
ACM
15 years 3 months ago
Modeling attacks on physical unclonable functions
We show in this paper how several proposed Physical Unclonable Functions (PUFs) can be broken by numerical modeling attacks. Given a set of challenge-response pairs (CRPs) of a PU...
Ulrich Rührmair, Frank Sehnke, Jan Sölte...