Sciweavers

101 search results - page 2 / 21
» Differential Cryptanalysis of Q
Sort
View
ASIACRYPT
1998
Springer
15 years 6 months ago
Optimal Resistance Against the Davies and Murphy Attack
Abstract. In recent years, three main types of attacks have been developed against Feistel-based ciphers, such as DES[1]; these attacks are linear cryptanalysis[2], differential cr...
Thomas Pornin
103
Voted
CARDIS
2004
Springer
149views Hardware» more  CARDIS 2004»
15 years 7 months ago
Differential Power Analysis Model and Some Results
CMOS gates consume different amounts of power whether their output has a falling or a rising edge. Therefore the overall power consumption of a CMOS circuit leaks information about...
Sylvain Guilley, Philippe Hoogvorst, Renaud Pacale...
87
Voted
IJNSEC
2006
84views more  IJNSEC 2006»
15 years 1 months ago
Security on Generalized Feistel Scheme with SP Round Function
This paper studies the security against differential/linear cryptanalysis and the pseudorandomness for a class of generalized Feistel scheme with SP round function called GFSP. We ...
Wenling Wu, Wentao Zhang, Dongdai Lin
AFRICACRYPT
2008
Springer
15 years 3 months ago
Differential Cryptanalysis of Reduced-Round PRESENT
: In this paper, we have presented flaws in differential cryptanalysis of reduced round variant of PRESENT given by M.Wang in [3] [4] for 80 bits key length and we have shown that ...
Meiqin Wang
156
Voted
INFOCOM
2009
IEEE
15 years 8 months ago
DiffQ: Practical Differential Backlog Congestion Control for Wireless Networks
—Congestion control in wireless multi-hop networks is challenging and complicated because of two reasons. First, interference is ubiquitous and causes loss in the shared medium. ...
Ajit Warrier, Sankararaman Janakiraman, Sangtae Ha...