Sciweavers

176 search results - page 20 / 36
» Distinguishing Attacks on T-Functions
Sort
View
ASIACRYPT
2004
Springer
15 years 5 months ago
How Far Can We Go Beyond Linear Cryptanalysis?
Abstract. Several generalizations of linear cryptanalysis have been proposed in the past, as well as very similar attacks in a statistical point of view. In this paper, we define ...
Thomas Baignères, Pascal Junod, Serge Vaude...
FSE
2003
Springer
99views Cryptology» more  FSE 2003»
15 years 5 months ago
Analysis of Involutional Ciphers: Khazad and Anubis
In this paper we study structural properties of SPN ciphers in which both the S-boxes and the affine layers are involutions. We apply our observations to the recently designed Rijn...
Alex Biryukov
FC
2010
Springer
169views Cryptology» more  FC 2010»
15 years 3 months ago
A Formal Approach for Automated Reasoning about Off-Line and Undetectable On-Line Guessing
Abstract. Starting from algebraic properties that enable guessing lowentropy secrets, we formalize guessing rules for symbolic verification. The rules are suited for both off-line ...
Bogdan Groza, Marius Minea
IASTEDSE
2004
15 years 1 months ago
Design and evaluation of birthmarks for detecting theft of java programs
200402.tex ABSTRACT To detect theft of Java class files efficiently, we have so far proposed a concept of Java birthmarks. Since the birthmarks are unique and native characteristic...
Haruaki Tamada, Masahide Nakamura, Akito Monden
ASIACRYPT
2010
Springer
14 years 9 months ago
The World Is Not Enough: Another Look on Second-Order DPA
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks using a distance-of-means test, correlation analysi...
François-Xavier Standaert, Nicolas Veyrat-C...