Sciweavers

1769 search results - page 108 / 354
» Cryptography
Sort
View
EUROCRYPT
2009
Springer
16 years 3 months ago
Breaking RSA Generically Is Equivalent to Factoring
We show that a generic ring algorithm for breaking RSA in ZN can be converted into an algorithm for factoring the corresponding RSA-modulus N. Our results imply that any attempt at...
Divesh Aggarwal, Ueli M. Maurer
CHES
2009
Springer
125views Cryptology» more  CHES 2009»
16 years 3 months ago
SSE Implementation of Multivariate PKCs on Modern x86 CPUs
Anna Inn-Tung Chen, Ming-Shing Chen, Tien-Ren Chen...
PKC
2009
Springer
175views Cryptology» more  PKC 2009»
16 years 3 months ago
Implicit Factoring: On Polynomial Time Factoring Given Only an Implicit Hint
We address the problem of polynomial time factoring RSA moduli N1 = p1q1 with the help of an oracle. As opposed to other approaches that require an oracle that explicitly outputs b...
Alexander May, Maike Ritzenhofen
CHES
2009
Springer
126views Cryptology» more  CHES 2009»
15 years 10 months ago
Practical Electromagnetic Template Attack on HMAC
In this paper, we show a very efficient side channel attack against HMAC. Our attack assumes the presence of a side channel that reveals the Hamming distance of some registers. Aft...
Pierre-Alain Fouque, Gaëtan Leurent, Denis R&...
124
Voted
IMA
2009
Springer
132views Cryptology» more  IMA 2009»
15 years 10 months ago
Subspace Codes
Abstract. This paper is a survey of bounds and constructions for subspace codes designed for the injection metric, a distance measure that arises in the context of correcting adver...
Azadeh Khaleghi, Danilo Silva, Frank R. Kschischan...