Sciweavers

1769 search results - page 174 / 354
» Cryptography
Sort
View
142
Voted
SACRYPT
2007
Springer
167views Cryptology» more  SACRYPT 2007»
15 years 9 months ago
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Abstract. At DRM 2002, Chow et al. [4] presented a method for implementing the DES block cipher such that it becomes hard to extract the embedded secret key in a white-box attack c...
Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart P...
125
Voted
SSC
2007
Springer
161views Cryptology» more  SSC 2007»
15 years 9 months ago
On Attacks on Filtering Generators Using Linear Subspace Structures
Abstract. The filter generator consists of a linear feedback shift register (LFSR) and a Boolean filtering function that combines some bits from the shift register to create a ke...
Sondre Rønjom, Guang Gong, Tor Helleseth
134
Voted
SSC
2007
Springer
140views Cryptology» more  SSC 2007»
15 years 9 months ago
Existence of Modular Sonar Sequences of Twin-Prime Product Length
In this paper, we investigate the existence of modular sonar sequences of length v and mod v where v is a product of twin primes. For v = 3 · 5 = 15, we have found some old and ne...
Sung-Jun Yoon, Hong-Yeop Song
120
Voted
TCC
2007
Springer
112views Cryptology» more  TCC 2007»
15 years 9 months ago
On the Necessity of Rewinding in Secure Multiparty Computation
We investigate whether security of multiparty computation in the information-theoretic setting implies their security under concurrent composition. We show that security in the sta...
Michael Backes, Jörn Müller-Quade, Domin...
143
Voted
TCC
2007
Springer
104views Cryptology» more  TCC 2007»
15 years 9 months ago
Obfuscation for Cryptographic Purposes
Abstract. An obfuscation O of a function F should satisfy two requirements: firstly, using O it should be possible to evaluate F; secondly, O should not reveal anything about F th...
Dennis Hofheinz, John Malone-Lee, Martijn Stam