Sciweavers

42 search results - page 4 / 9
» Algebraic Techniques in Differential Cryptanalysis
Sort
View
SACRYPT
2004
Springer
122views Cryptology» more  SACRYPT 2004»
15 years 2 months ago
Extending the Resynchronization Attack
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first describ...
Frederik Armknecht, Joseph Lano, Bart Preneel
89
Voted
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
14 years 7 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
QEST
2005
IEEE
15 years 3 months ago
Fluid Flow Approximation of PEPA models
In this paper we present a novel performance analysis technique for large-scale systems modelled in the stochastic process algebra PEPA. In contrast to the well-known approach of ...
Jane Hillston
FMCAD
2004
Springer
15 years 1 months ago
Verification of Analog and Mixed-Signal Circuits Using Hybrid System Techniques
In this paper we demonstrate a potential extension of formal verification methodology in order to deal with time-domain properties of analog and mixed-signal circuits whose dynamic...
Thao Dang, Alexandre Donzé, Oded Maler
CRYPTO
2007
Springer
149views Cryptology» more  CRYPTO 2007»
15 years 1 months ago
Hash Functions and the (Amplified) Boomerang Attack
Abstract. Since Crypto 2004, hash functions have been the target of many attacks which showed that several well-known functions such as SHA-0 or MD5 can no longer be considered sec...
Antoine Joux, Thomas Peyrin