Sciweavers

397 search results - page 11 / 80
» Pseudorandom Functions and Lattices
Sort
View
CRYPTO
2006
Springer
110views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
On the Power of the Randomized Iterate
We consider two of the most fundamental theorems in Cryptography. The first, due to H
Iftach Haitner, Danny Harnik, Omer Reingold
SCN
2010
Springer
122views Communications» more  SCN 2010»
14 years 7 months ago
Recursive Lattice Reduction
Abstract. Lattice reduction is known to be a very powerful tool in modern cryptanalysis. In the literature, there are many lattice reduction algorithms that have been proposed with...
Thomas Plantard, Willy Susilo
60
Voted
EUSFLAT
2007
108views Fuzzy Logic» more  EUSFLAT 2007»
14 years 11 months ago
Lattice-Valued Possibilistic Entropy Functions
Lattice-valued entropy functions defined by a lattice-valued possibilistic distribution π on a space Ω are defined as the expected value (in the sense of Sugeno integral) of ...
Ivan Kramosil
ISCAS
2008
IEEE
129views Hardware» more  ISCAS 2008»
15 years 3 months ago
Physical unclonable function with tristate buffers
— The lack of robust tamper-proofing techniques in security applications has provided attackers the ability to virtually circumvent mathematically strong cryptographic primitive...
Erdinç Öztürk, Ghaith Hammouri, B...
ASIACRYPT
2007
Springer
15 years 3 months ago
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions
Unbalanced Feistel schemes with expanding functions are used to construct pseudo-random permutations from kn bits to kn bits by using random functions from n bits to (k − 1)n bit...
Jacques Patarin, Valérie Nachef, Côme...