Sciweavers

60 search results - page 6 / 12
» aes 2010
Sort
View
INDOCRYPT
2010
Springer
14 years 7 months ago
Attack on a Higher-Order Masking of the AES Based on Homographic Functions
In the recent years, Higher-order Side Channel attacks have been widely investigated. In particular, 2nd-order DPA have been improved and successfully applied to break several mask...
Emmanuel Prouff, Thomas Roche
TC
2010
14 years 4 months ago
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Tweakable enciphering schemes are length preserving block cipher modes of operation that provide a strong pseudo-random permutation. It has been suggested that these schemes can b...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...
FSE
2010
Springer
220views Cryptology» more  FSE 2010»
15 years 2 months ago
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
In this paper, we improve the recent rebound and start-from-the-middle attacks on AES-like permutations. Our new cryptanalysis technique uses the fact that one can view two rounds ...
Henri Gilbert, Thomas Peyrin
CHES
2010
Springer
214views Cryptology» more  CHES 2010»
14 years 11 months ago
Correlation-Enhanced Power Analysis Collision Attack
Side-channel based collision attacks are a mostly disregarded alternative to DPA for analyzing unprotected implementations. The advent of strong countermeasures, such as masking, h...
Amir Moradi, Oliver Mischke, Thomas Eisenbarth
JCT
2010
93views more  JCT 2010»
14 years 8 months ago
Ramanujan's lost notebook: Combinatorial proofs of identities associated with Heine's transformation or partial theta functions
Combinatorial proofs are given for certain entries in Ramanujan’s lost notebook. Bijections of Sylvester, Franklin, Wright, and Yee are employed. A new bijection, involving the n...
Bruce C. Berndt, Byungchan Kim, Ae Ja Yee