Selected Areas in Cryptography B

26 papers

YearTitle / Authors
2007A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software.
Makoto Matsumoto, Mutsuo Saito, Takuji Nishimura, Mariko Hagita
2007A Generic Method to Design Modes of Operation Beyond the Birthday Bound.
David Lefranc, Philippe Painchault, Valérie Rouat, Emmanuel Mayer
2007Analysis of Countermeasures Against Access Driven Cache Attacks on AES.
Johannes Blömer, Volker Krummel
2007Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic.
Roberto Maria Avanzi
2007Attacks on the ESA-PSS-04-151 MAC Scheme.
Georg Illies, Marian Margraf
2007Collisions for 70-Step SHA-1: On the Full Cost of Collision Search.
Christophe De Cannière, Florian Mendel, Christian Rechberger
2007Cryptanalysis of White Box DES Implementations.
Louis Goubin, Jean-Michel Masereel, Michaël Quisquater
2007Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings.
Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel
2007Cryptanalysis of the CRUSH Hash Function.
Matthew Henricksen, Lars R. Knudsen
2007Distinguishing Attack Against TPypy.
Yukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima
2007Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations.
Xinxin Fan, Guang Gong
2007Explicit Formulas for Efficient Multiplication in \mathbb
Elisa Gorla, Christoph Puttmann, Jamshid Shokrollahi
2007Extended BDD-Based Cryptanalysis of Keystream Generators.
Dirk Stegemann
2007Improved Side-Channel Collision Attacks on AES.
Andrey Bogdanov
2007Koblitz Curves and Integer Equivalents of Frobenius Expansions.
Billy Bob Brumley, Kimmo U. Järvinen
2007Linear Cryptanalysis of Non Binary Ciphers.
Thomas Baignères, Jacques Stern, Serge Vaudenay
2007MRHS Equation Systems.
Håvard Raddum
2007Passive-Only Key Recovery Attacks on RC4.
Serge Vaudenay, Martin Vuagnoux
2007Permutation After RC4 Key Scheduling Reveals the Secret Key.
Goutam Paul, Subhamoy Maitra
2007Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms.
Frédéric Amiel, Benoit Feix, Karine Villegas
2007Reduced Complexity Attacks on the Alternating Step Generator.
Shahram Khazaei, Simon Fischer, Willi Meier
2007Revisiting Correlation-Immunity in Filter Generators.
Aline Gouget, Hervé Sibert
2007Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers
Carlisle M. Adams, Ali Miri, Michael J. Wiener
2007The Delicate Issues of Addition with Respect to XOR Differences.
Gaoli Wang, Nathan Keller, Orr Dunkelman
2007The Security of the Extended Codebook (XCB) Mode of Operation.
David A. McGrew, Scott R. Fluhrer
2007Two Trivial Attacks on Trivium.
Alexander Maximov, Alex Biryukov