Sciweavers

1019 search results - page 12 / 204
» Cryptographic Design Vulnerabilities
Sort
View
CHES
2006
Springer
205views Cryptology» more  CHES 2006»
15 years 1 months ago
Automated Design of Cryptographic Devices Resistant to Multiple Side-Channel Attacks
Balanced dynamic dual-rail gates and asynchronous circuits have been shown, if implemented correctly, to have natural and efficient resistance to side-channel attacks. Despite thei...
Konrad J. Kulikowski, Alexander B. Smirnov, Alexan...
INDOCRYPT
2001
Springer
15 years 1 months ago
Cryptographic Functions and Design Criteria for Block Ciphers
Most last-round attacks on iterated block ciphers provide some design criteria for the round function. Here, we focus on the links between the underlying properties. Most notably, ...
Anne Canteaut
IJNSEC
2006
56views more  IJNSEC 2006»
14 years 9 months ago
New Class of Cryptographic Primitives and Cipher Design for Networks Security
Nikolay A. Moldovyan, Alexander A. Moldovyan, Ma A...
49
Voted
JISE
2008
50views more  JISE 2008»
14 years 9 months ago
Automated Design of Cryptographic Hash Schemes by Evolving Highly-Nonlinear Functions
Juan M. Estévez-Tapiador, Julio Césa...