Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns (Englisch)
- Neue Suche nach: Rebeiro, C.
- Neue Suche nach: Mukhopadhyay, D.
- Neue Suche nach: Rebeiro, C.
- Neue Suche nach: Mukhopadhyay, D.
- Neue Suche nach: Kiayias, Aggelos
In:
Cryptographers' track at the RSA conference; Topics in cryptology - CT-RSA 2011
6558
;
89-103
;
2011
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace Patterns
-
Beteiligte:
-
Kongress:Cryptographers' track at the RSA conference; Topics in cryptology - CT-RSA 2011 ; 2011 ; San Francisco, CA
-
Erschienen in:LECTURE NOTES IN COMPUTER SCIENCE , 6558 ; 89-103
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Berlin
-
Erscheinungsdatum:01.01.2011
-
Format / Umfang:15 pages
-
Anmerkungen:International conference proceedings. Includes bibliographical references and index
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Secure Set Intersection with Untrusted Hardware TokensFischlin, M. / Pinkas, B. / Sadeghi, A.-R. / Schneider, T. / Visconti, I. et al. | 2011
- 17
-
Efficient Secure Two-Party ExponentiationYu, C.-H. / Chow, S.S.M. / Chung, K.-M. / Liu, F.-H. et al. | 2011
- 33
-
A General, Flexible and Efficient Proof of Inclusion and ExclusionPeng, K. et al. | 2011
- 49
-
Non-interactive Confirmer SignaturesChow, S.S.M. / Haralambiev, K. et al. | 2011
- 65
-
Communication-Efficient 2-Round Group Key Establishment from PairingsNeupane, K. / Steinwandt, R. et al. | 2011
- 77
-
Defeating RSA Multiply-Always and Message Blinding CountermeasuresWitteman, M.F. / van Woudenberg, J.G.J. / Menarini, F. et al. | 2011
- 89
-
Cryptanalysis of CLEFIA Using Differential Methods with Cache Trace PatternsRebeiro, C. / Mukhopadhyay, D. et al. | 2011
- 104
-
Improving Differential Power Analysis by Elastic Alignmentvan Woudenberg, J.G.J. / Witteman, M.F. / Bakker, B. et al. | 2011
- 120
-
NSA's Role in the Development of DESGeorge, R.M. et al. | 2011
- 121
-
Designing Efficient Authenticated Key Exchange Resilient to Leakage of Ephemeral Secret KeysFujioka, A. / Suzuki, K. et al. | 2011
- 142
-
Contributory Password-Authenticated Group Key Exchange with Join CapabilityAbdalla, M. / Chevalier, C. / Granboulan, L. / Pointcheval, D. et al. | 2011
- 161
-
Ideal Key Derivation and Encryption in Simulation-Based SecurityKusters, R. / Tuengerthal, M. et al. | 2011
- 180
-
Beyond Provable Security Verifiable IND-CCA Security of OAEPBarthe, G. / Gregoire, B. / Lakhnech, Y. / Beguelin, S.Z. et al. | 2011
- 197
-
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision ApproachWang, L. / Sasaki, Y. / Komatsubara, W. / Ohta, K. / Sakiyama, K. et al. | 2011
- 213
-
MJH: A Faster Alternative to MDC-2Lee, J. / Stam, M. et al. | 2011
- 237
-
Online Ciphers from Tweakable BlockciphersRogaway, P. / Zhang, H. et al. | 2011
- 250
-
Meet-in-the-Middle Attacks on Reduced-Round XTEASekar, G. / Mouha, N. / Velichkov, V. / Preneel, B. et al. | 2011
- 268
-
Expedient Non-malleability Notions for Hash FunctionsBaecher, P. / Fischlin, M. / Schroder, D. et al. | 2011
- 284
-
Stronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant ProtocolsStebila, D. / Kuppusamy, L. / Rangasamy, J. / Boyd, C. / Nieto, J.G. et al. | 2011
- 302
-
On Shortening Ciphertexts: New Constructions for Compact Public Key and Stateful Encryption SchemesBaek, J. / Chu, C.-K. / Zhou, J. et al. | 2011
- 319
-
Better Key Sizes (and Attacks) for LWE-Based EncryptionLindner, R. / Peikert, C. et al. | 2011
- 340
-
Binary Huff CurvesDevigne, J. / Joye, M. et al. | 2011
- 356
-
A Variant of the F4 AlgorithmJoux, A. / Vitse, V. et al. | 2011
- 376
-
Attribute-Based SignaturesMaji, H.K. / Prabhakaran, M. / Rosulek, M. et al. | 2011
- 393
-
Sub-linear Size Traceable Ring Signatures without Random OraclesFujisaki, E. et al. | 2011