Sciweavers

1769 search results - page 138 / 354
» Cryptography
Sort
View
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
15 years 9 months ago
A New Distinguisher for Clock Controlled Stream Ciphers
In this paper we present a distinguisher targeting towards irregularly clocked filter generators. The attack is applied on the irregularly clocked stream cipher called LILI-II. LI...
Håkan Englund, Thomas Johansson
86
Voted
FSE
2005
Springer
107views Cryptology» more  FSE 2005»
15 years 9 months ago
Small Scale Variants of the AES
In this paper we define small scale variants of the AES. These variants inherit the design features of the AES and provide a suitable framework for comparing different cryptanaly...
Carlos Cid, Sean Murphy, Matthew J. B. Robshaw
FSE
2005
Springer
113views Cryptology» more  FSE 2005»
15 years 9 months ago
SMASH - A Cryptographic Hash Function
1 This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and...
Lars R. Knudsen
FSE
2005
Springer
108views Cryptology» more  FSE 2005»
15 years 9 months ago
DPA Attacks and S-Boxes
For the power consumption model called Hamming weight model, we rewrite DPA attacks in terms of correlation coefficients between two Boolean functions. We exhibit properties of S-b...
Emmanuel Prouff
HIP
2005
Springer
174views Cryptology» more  HIP 2005»
15 years 9 months ago
Collaborative Filtering CAPTCHAs
Abstract. Current CAPTCHAs require users to solve objective questions such as text recognition or image recognition. We propose a class of CAPTCHAs based on collaborative filterin...
Monica Chew, J. D. Tygar