Sciweavers

1769 search results - page 170 / 354
» Cryptography
Sort
View
120
Voted
CRYPTO
2007
Springer
130views Cryptology» more  CRYPTO 2007»
15 years 9 months ago
A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator
An elliptic curve random number generator (ECRNG) has been approved in a NIST standards and proposed for ANSI and SECG draft standards. This paper proves that, if three conjecture...
Daniel R. L. Brown, Kristian Gjøsteen
EUROCRYPT
2007
Springer
15 years 9 months ago
Non-interactive Proofs for Integer Multiplication
Abstract. We present two universally composable and practical protocols by which a dealer can, verifiably and non-interactively, secret-share an integer among a set of players. Mo...
Ivan Damgård, Rune Thorbek
FPL
2007
Springer
154views Hardware» more  FPL 2007»
15 years 9 months ago
Physical Unclonable Functions, FPGAs and Public-Key Crypto for IP Protection
In recent years, IP protection of FPGA hardware designs has become a requirement for many IP vendors. To this end solutions have been proposed based on the idea of bitstream encry...
Jorge Guajardo, Sandeep Kumar, Geert Jan Schrijen,...
110
Voted
FSE
2007
Springer
87views Cryptology» more  FSE 2007»
15 years 9 months ago
On the Security of IV Dependent Stream Ciphers
CryptMT v3 is a stream cipher submitted to eStream project, and has entered the third evaluation phase. Any attack has not been found until now. In this paper, we mainly discuss th...
Côme Berbain, Henri Gilbert
106
Voted
FSE
2007
Springer
101views Cryptology» more  FSE 2007»
15 years 9 months ago
Producing Collisions for Panama, Instantaneously
We present a practical attack on the Panama hash function that generates a collision in 26 evaluations of the state updating function. Our attack improves that of Rijmen and cowork...
Joan Daemen, Gilles Van Assche