Cache Timing Analysis of LFSR-Based Stream Ciphers (Englisch)
- Neue Suche nach: Leander, G.
- Neue Suche nach: Zenner, E.
- Neue Suche nach: Hawkes, P.
- Neue Suche nach: Leander, G.
- Neue Suche nach: Zenner, E.
- Neue Suche nach: Hawkes, P.
- Neue Suche nach: Parker, Matthew G.
In:
IMA International Conference; Cryptography and coding
5921
;
433-445
;
2009
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Cache Timing Analysis of LFSR-Based Stream Ciphers
-
Beteiligte:
-
Kongress:12th, IMA International Conference; Cryptography and coding ; 2009 ; Cirencester, England
-
Erschienen in:IMA International Conference; Cryptography and coding , 5921 ; 433-445LECTURE NOTES IN COMPUTER SCIENCE , 5921 ; 433-445
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:New York
-
Erscheinungsdatum:01.01.2009
-
Format / Umfang:13 pages
-
Anmerkungen:Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Subspace CodesKhaleghi, A. / Silva, D. / Kschischang, F.R. et al. | 2009
- 22
-
On Linear Programming Decoding on a Quantized Additive White Gaussian Noise ChannelRosnes, E. et al. | 2009
- 38
-
Codes as Modules over Skew Polynomial RingsBoucher, D. / Ulmer, F. et al. | 2009
- 56
-
On Higher Weights and Code ExistenceSchaathun, H.G. et al. | 2009
- 65
-
Mass Formula for Even Codes over ZZ~8Betsumiya, K. / Betty, R.A.L. / Munemasa, A. et al. | 2009
- 78
-
On the Classification of Self-dual ZZ~k-CodesHarada, M. / Munemasa, A. et al. | 2009
- 91
-
On Linear Codes from Maximal CurvesFanali, S. et al. | 2009
- 112
-
On Linear Cryptanalysis with Many Linear ApproximationsGerard, B. / Tillich, J.-P. et al. | 2009
- 133
-
Bivium as a Mixed-Integer Linear Programming ProblemBorghoff, J. / Knudsen, L.R. / Stolpe, M. et al. | 2009
- 153
-
Security of Cyclic Double Block Length Hash FunctionsFleischmann, E. / Gorski, M. / Lucks, S. et al. | 2009
- 176
-
Another Glance at Double-Length HashingOzen, O. / Stam, M. et al. | 2009
- 202
-
Geometric Ideas for Cryptographic Equation Solving in Even CharacteristicMurphy, S. / Paterson, M.B. et al. | 2009
- 222
-
Provably Secure Code-Based Threshold Ring SignaturesDallot, L. / Vergnaud, D. et al. | 2009
- 236
-
A New Protocol for the Nearby Friend ProblemChatterjee, S. / Karabina, K. / Menezes, A. et al. | 2009
- 252
-
Distributing the Key Distribution Centre in Sakai-Kasahara Based SystemsGeisler, M. / Smart, N.P. et al. | 2009
- 263
-
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry CodesChen, H. / Ling, S. / Padro, C. / Wang, H. / Xing, C. et al. | 2009
- 278
-
Attribute-Based Encryption Supporting Direct/Indirect Revocation ModesAttrapadung, N. / Imai, H. et al. | 2009
- 301
-
Certificate-Free Attribute AuthenticationKhader, D. / Chen, L. / Davenport, J.H. et al. | 2009
- 326
-
Comparing with RSACathalo, J. / Naccache, D. / Quisquater, J.-J. et al. | 2009
- 336
-
Double-Exponentiation in Factor-4 Groups and Its ApplicationsKarabina, K. et al. | 2009
- 351
-
Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete LogarithmsJoux, A. / Lercier, R. / Naccache, D. / Thome, E. et al. | 2009
- 368
-
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm ProblemsGalbraith, S. / Ruprai, R.S. et al. | 2009
- 383
-
On Designs and Multiplier Groups Constructed from Almost Perfect Nonlinear FunctionsEdel, Y. / Pott, A. et al. | 2009
- 402
-
A New Family of Hyper-Bent Boolean Functions in Polynomial FormMesnager, S. et al. | 2009
- 418
-
The Rayleigh Quotient of Bent FunctionsDanielsen, L.E. / Parker, M.G. / Sole, P. et al. | 2009
- 433
-
Cache Timing Analysis of LFSR-Based Stream CiphersLeander, G. / Zenner, E. / Hawkes, P. et al. | 2009
- 446
-
Optimal Recovery of Secret Keys from Weak Side Channel TracesSchindler, W. / Walter, C.D. et al. | 2009
- 469
-
Practical Zero-Knowledge Proofs for Circuit EvaluationGhadafi, E. / Smart, N.P. / Warinschi, B. et al. | 2009