Sciweavers

13 search results - page 2 / 3
» sacrypt 2004
Sort
View
SACRYPT
2004
Springer
113views Cryptology» more  SACRYPT 2004»
13 years 11 months ago
A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue
Addition-subtraction-chains obtained from signed digit recodings of integers are a common tool for computing multiples of random elements of a group where the computation of invers...
Roberto Maria Avanzi
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
13 years 11 months ago
FOX : A New Family of Block Ciphers
In this paper, we describe the design of a new family of block ciphers based on a Lai-Massey scheme, named FOX. The main features of this design, besides a very high security level...
Pascal Junod, Serge Vaudenay
SACRYPT
2004
Springer
136views Cryptology» more  SACRYPT 2004»
13 years 11 months ago
Cryptanalysis of a White Box AES Implementation
The white box attack context as described in [1, 2] is the common setting where cryptographic software is executed in an untrusted environment—i.e. an attacker has gained access ...
Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi
SACRYPT
2004
Springer
125views Cryptology» more  SACRYPT 2004»
13 years 11 months ago
Password Based Key Exchange with Mutual Authentication
A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [18] and later by Gennaro and Li...
Shaoquan Jiang, Guang Gong
SACRYPT
2004
Springer
105views Cryptology» more  SACRYPT 2004»
13 years 11 months ago
Provably Secure Masking of AES
A general method to secure cryptographic algorithm implementations against side-channel attacks is the use of randomization techniques and, in particular, masking. Roughly speaking...
Johannes Blömer, Jorge Guajardo, Volker Krumm...