Sciweavers

2967 search results - page 453 / 594
» Cryptology
Sort
View
CHES
2003
Springer
115views Cryptology» more  CHES 2003»
15 years 10 months ago
The Doubling Attack - Why Upwards Is Better than Downwards
The recent developments of side channel attacks have lead implementers to use more and more sophisticated countermeasures in critical operations such as modular exponentiation, or ...
Pierre-Alain Fouque, Frédéric Valett...
CHES
2003
Springer
145views Cryptology» more  CHES 2003»
15 years 10 months ago
Cryptanalysis of DES Implemented on Computers with Cache
This paper presents the results of applying an attack against the Data Encryption Standard (DES) implemented in some applications, using side-channel information based on CPU delay...
Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Mak...
CRYPTO
2003
Springer
101views Cryptology» more  CRYPTO 2003»
15 years 10 months ago
The Impact of Decryption Failures on the Security of NTRU Encryption
NTRUEncrypt is unusual among public-key cryptosystems in that, with standard parameters, validly generated ciphertexts can fail to decrypt. This affects the provable security prop...
Nick Howgrave-Graham, Phong Q. Nguyen, David Point...
CRYPTO
2003
Springer
173views Cryptology» more  CRYPTO 2003»
15 years 10 months ago
A Tweakable Enciphering Mode
We describe a block-cipher mode of operation, CMC, that turns an n-bit block cipher into a tweakable enciphering scheme that acts on strings of mn bits, where m ≥ 2. When the und...
Shai Halevi, Phillip Rogaway
CRYPTO
2003
Springer
95views Cryptology» more  CRYPTO 2003»
15 years 10 months ago
Plaintext Awareness via Key Registration
Abstract. In this paper, we reconsider the notion of plaintext awareness. We present a new model for plaintext-aware encryption that is both natural and useful. We achieve plaintex...
Jonathan Herzog, Moses Liskov, Silvio Micali