Sciweavers

20175 search results - page 69 / 4035
» Is abstraction the key to computing
Sort
View
121
Voted
PQCRYPTO
2010
298views Cryptology» more  PQCRYPTO 2010»
15 years 4 months ago
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
Abstract. In this paper a new structural attack on the McEliece/Niederreiter public key cryptosystem based on subcodes of generalized ReedSolomon codes proposed by Berger and Loidr...
Christian Wieschebrink
FMOODS
2007
15 years 2 months ago
KeY: A Formal Method for Object-Oriented Systems
Abstract. This paper gives an overview of the KeY approach and highlights the main features of the KeY system. KeY is an approach (and a system) for the deductive verification of ...
Wolfgang Ahrendt, Bernhard Beckert, Reiner Hä...
101
Voted
CADE
2004
Springer
16 years 27 days ago
Attacking a Protocol for Group Key Agreement by Refuting Incorrect Inductive Conjectures
Abstract. Automated tools for finding attacks on flawed security protocols often struggle to deal with protocols for group key agreement. Systems designed for fixed 2 or 3 party pr...
Graham Steel, Alan Bundy, Monika Maidl
PKC
2007
Springer
132views Cryptology» more  PKC 2007»
15 years 6 months ago
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions
Abstract. We introduce a new approach for cryptanalysis of key agreement protocols based on noncommutative groups. Our approach uses functions that estimate the distance of a group...
Dima Ruinskiy, Adi Shamir, Boaz Tsaban
109
Voted
CRYPTO
2000
Springer
123views Cryptology» more  CRYPTO 2000»
15 years 5 months ago
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
Abstract. We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. Unlike previous attacks, th...
Don Coppersmith, Lars R. Knudsen, Chris J. Mitchel...