Sciweavers

101 search results - page 10 / 21
» Differential Cryptanalysis of Q
Sort
View
CASC
2007
Springer
124views Mathematics» more  CASC 2007»
15 years 3 months ago
A Full System of Invariants for Third-Order Linear Partial Differential Operators in General Form
We find a full system of invariants with respect to gauge transformations L g-1 Lg for third-order hyperbolic linear partial differential operators on the plane. The operators are...
Ekaterina Shemyakova, Franz Winkler
FSE
2008
Springer
162views Cryptology» more  FSE 2008»
15 years 1 months ago
Collisions on SHA-0 in One Hour
At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
Stéphane Manuel, Thomas Peyrin
EUROCRYPT
2006
Springer
15 years 3 months ago
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures
Abstract. Lattice-based signature schemes following the GoldreichGoldwasser-Halevi (GGH) design have the unusual property that each signature leaks information on the signer's...
Phong Q. Nguyen, Oded Regev
FSE
2004
Springer
109views Cryptology» more  FSE 2004»
15 years 3 months ago
On the Additive Differential Probability of Exclusive-Or
We study the differential probability adp of exclusive-or when differences are expressed using addition modulo 2N . This function is important when analysing symmetric primitives t...
Helger Lipmaa, Johan Wallén, Philippe Dumas
INDOCRYPT
2010
Springer
14 years 9 months ago
Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions
Abstract. Consider the RSA public key cryptosystem with the parameters N = pq, q < p < 2q, public encryption exponent e and private decryption exponent d. In this paper, cryp...
Santanu Sarkar, Sourav Sengupta, Subhamoy Maitra