Cache Timing Analysis of LFSR-Based Stream Ciphers (English)
- New search for: Leander, G.
- New search for: Zenner, E.
- New search for: Hawkes, P.
- New search for: Leander, G.
- New search for: Zenner, E.
- New search for: Hawkes, P.
- New search for: Parker, Matthew G.
In:
IMA International Conference; Cryptography and coding
5921
;
433-445
;
2009
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Cache Timing Analysis of LFSR-Based Stream Ciphers
-
Contributors:
-
Conference:12th, IMA International Conference; Cryptography and coding ; 2009 ; Cirencester, England
-
Published in:IMA International Conference; Cryptography and coding , 5921 ; 433-445LECTURE NOTES IN COMPUTER SCIENCE , 5921 ; 433-445
-
Publisher:
- New search for: Springer
-
Place of publication:New York
-
Publication date:2009-01-01
-
Size:13 pages
-
Remarks:Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Subspace CodesKhaleghi, A. / Silva, D. / Kschischang, F.R. et al. | 2009
- 22
-
On Linear Programming Decoding on a Quantized Additive White Gaussian Noise ChannelRosnes, E. et al. | 2009
- 38
-
Codes as Modules over Skew Polynomial RingsBoucher, D. / Ulmer, F. et al. | 2009
- 56
-
On Higher Weights and Code ExistenceSchaathun, H.G. et al. | 2009
- 65
-
Mass Formula for Even Codes over ZZ~8Betsumiya, K. / Betty, R.A.L. / Munemasa, A. et al. | 2009
- 78
-
On the Classification of Self-dual ZZ~k-CodesHarada, M. / Munemasa, A. et al. | 2009
- 91
-
On Linear Codes from Maximal CurvesFanali, S. et al. | 2009
- 112
-
On Linear Cryptanalysis with Many Linear ApproximationsGerard, B. / Tillich, J.-P. et al. | 2009
- 133
-
Bivium as a Mixed-Integer Linear Programming ProblemBorghoff, J. / Knudsen, L.R. / Stolpe, M. et al. | 2009
- 153
-
Security of Cyclic Double Block Length Hash FunctionsFleischmann, E. / Gorski, M. / Lucks, S. et al. | 2009
- 176
-
Another Glance at Double-Length HashingOzen, O. / Stam, M. et al. | 2009
- 202
-
Geometric Ideas for Cryptographic Equation Solving in Even CharacteristicMurphy, S. / Paterson, M.B. et al. | 2009
- 222
-
Provably Secure Code-Based Threshold Ring SignaturesDallot, L. / Vergnaud, D. et al. | 2009
- 236
-
A New Protocol for the Nearby Friend ProblemChatterjee, S. / Karabina, K. / Menezes, A. et al. | 2009
- 252
-
Distributing the Key Distribution Centre in Sakai-Kasahara Based SystemsGeisler, M. / Smart, N.P. et al. | 2009
- 263
-
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry CodesChen, H. / Ling, S. / Padro, C. / Wang, H. / Xing, C. et al. | 2009
- 278
-
Attribute-Based Encryption Supporting Direct/Indirect Revocation ModesAttrapadung, N. / Imai, H. et al. | 2009
- 301
-
Certificate-Free Attribute AuthenticationKhader, D. / Chen, L. / Davenport, J.H. et al. | 2009
- 326
-
Comparing with RSACathalo, J. / Naccache, D. / Quisquater, J.-J. et al. | 2009
- 336
-
Double-Exponentiation in Factor-4 Groups and Its ApplicationsKarabina, K. et al. | 2009
- 351
-
Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete LogarithmsJoux, A. / Lercier, R. / Naccache, D. / Thome, E. et al. | 2009
- 368
-
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm ProblemsGalbraith, S. / Ruprai, R.S. et al. | 2009
- 383
-
On Designs and Multiplier Groups Constructed from Almost Perfect Nonlinear FunctionsEdel, Y. / Pott, A. et al. | 2009
- 402
-
A New Family of Hyper-Bent Boolean Functions in Polynomial FormMesnager, S. et al. | 2009
- 418
-
The Rayleigh Quotient of Bent FunctionsDanielsen, L.E. / Parker, M.G. / Sole, P. et al. | 2009
- 433
-
Cache Timing Analysis of LFSR-Based Stream CiphersLeander, G. / Zenner, E. / Hawkes, P. et al. | 2009
- 446
-
Optimal Recovery of Secret Keys from Weak Side Channel TracesSchindler, W. / Walter, C.D. et al. | 2009
- 469
-
Practical Zero-Knowledge Proofs for Circuit EvaluationGhadafi, E. / Smart, N.P. / Warinschi, B. et al. | 2009