Sciweavers

1769 search results - page 190 / 354
» Cryptography
Sort
View
131
Voted
FSE
2004
Springer
84views Cryptology» more  FSE 2004»
15 years 9 months ago
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines
We present a realization of an LFSM that utilizes an LFSR. This is based on a well-known fact from linear algebra. This structure is used to show that a previous attempt at using a...
Jin Hong, Dong Hoon Lee 0002, Seongtaek Chee, Pala...
106
Voted
FSE
2004
Springer
108views Cryptology» more  FSE 2004»
15 years 9 months ago
Algebraic Attacks on Summation Generators
We apply the algebraic attacks on stream ciphers with memories to the summation generator. For a summation generator that uses n LFSRs, an algebraic equation relating the key strea...
Dong Hoon Lee 0002, Jaeheon Kim, Jin Hong, Jae Woo...
141
Voted
FSE
2004
Springer
150views Cryptology» more  FSE 2004»
15 years 9 months ago
Ciphers Secure against Related-Key Attacks
Abstract. In a related-key attack, the adversary is allowed to transform the secret key and request encryptions of plaintexts under the transformed key. This paper studies the secu...
Stefan Lucks
120
Voted
IFIP
2004
Springer
15 years 9 months ago
Pattern-Matching Spi-Calculus
Cryptographic protocols often make use of nested cryptographic primitives, for example signed message digests, or encrypted signed messages. Gordon and Jeffrey’s prior work on ty...
Christian Haack, Alan Jeffrey
119
Voted
ITRUST
2004
Springer
15 years 9 months ago
The Use of Formal Methods in the Analysis of Trust (Position Paper)
Security and trust are two properties of modern computing systems that are the focus of much recent interest. They play an increasingly significant role in the requirements for mo...
Michael J. Butler, Michael Leuschel, Stépha...