Sciweavers

129 search results - page 5 / 26
» iacr 2011
Sort
View
IACR
2011
128views more  IACR 2011»
13 years 9 months ago
Fault-propagation Pattern Based DFA on SPN Structure Block Ciphers using Bitwise Permutation, with Application to PRESENT and PR
—This paper proposes a novel fault-propagation pattern based differential fault analysis method - FPP-DFA, and proves its feasibility on SPN structure block ciphers using bitwise...
Xin-jie Zhao, Tao Wang, Shi-ze Guo
IACR
2011
87views more  IACR 2011»
13 years 9 months ago
Untangling RFID Privacy Models
This article investigates privacy in Radio Frequency IDentification (RFID) systems. We survey the eight most well-known RFID privacy models. We examine their advantages and drawba...
Iwen Coisel, Tania Martin
IACR
2011
151views more  IACR 2011»
13 years 9 months ago
Cryptanalysis with Ternary Difference: Applied to Block Cipher PRESENT
: Signed difference approach was first introduced by Wang for finding collision in MD5. In this paper we introduce ternary difference approach and present it in 3 symbols. To show ...
Farzaneh Abazari, Babak Sadeghian
IACR
2011
142views more  IACR 2011»
13 years 9 months ago
XMSS - A Practical Forward Secure Signature Scheme based on Minimal Security Assumptions
We present the hash-based signature scheme XMSS. It is the first provably (forward) secure and practical signature scheme with minimal security requirements: a pseudorandom and a ...
Johannes Buchmann, Erik Dahmen, Andreas Hülsi...
IACR
2011
255views more  IACR 2011»
13 years 9 months ago
A Standard-Model Security Analysis of TLS-DHE
TLS is the most important cryptographic protocol in use today. However, up to now there is no complete cryptographic security proof in the standard model, nor in any other model. ...
Tibor Jager, Florian Kohlar, Sven Schäge, J&o...