Sciweavers

2967 search results - page 439 / 594
» Cryptology
Sort
View
IMA
2005
Springer
127views Cryptology» more  IMA 2005»
15 years 11 months ago
On the Automatic Construction of Indistinguishable Operations
Abstract. An increasingly important design constraint for software running on ubiquitous computing devices is security, particularly against physical methods such as side-channel a...
Manuel Barbosa, Dan Page
INDOCRYPT
2005
Springer
15 years 11 months ago
On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks
Prouff has introduced recently, at FSE 2005, the notion of transparency order of S-boxes. This new characteristic is related to the ability of an S-box, used in a cryptosystem in ...
Claude Carlet
INDOCRYPT
2005
Springer
15 years 11 months ago
MaTRU: A New NTRU-Based Cryptosystem
Abstract. In this paper, we propose a new variant of the NTRU public key cryptosystem − the MaTRU cryptosystem. MaTRU works under the same general principles as the NTRU cryptosy...
Michael Coglianese, Bok-Min Goi
INDOCRYPT
2005
Springer
15 years 11 months ago
Cryptanalysis of the Quadratic Generator
Let p be a prime and let a and c be integers modulo p. The quadratic congruential generator (QCG) is a sequence (vn) of pseudorandom numbers defined by the relation vn+1 ≡ av2 n...
Domingo Gómez, Jaime Gutierrez, Álva...
PKC
2005
Springer
156views Cryptology» more  PKC 2005»
15 years 11 months ago
Cryptanalysis of HFEv and Internal Perturbation of HFE
Hidden field equation (HFE) multivariable cryptosystems were first suggested by Patarin. Kipnis and Shamir showed that to make the cryptosystem secure, a special parameter D of a...
Jintai Ding, Dieter Schmidt