Cache Timing Analysis of LFSR-Based Stream Ciphers (English)
- New search for: Leander, Gregor
- New search for: Zenner, Erik
- New search for: Hawkes, Philip
- New search for: Leander, Gregor
- New search for: Zenner, Erik
- New search for: Hawkes, Philip
In:
Cryptography and Coding
6
;
433-445
;
2009
- Article/Chapter (Book) / Electronic Resource
-
Title:Cache Timing Analysis of LFSR-Based Stream Ciphers
-
Contributors:
-
Published in:Cryptography and Coding , 6 ; 433-445Lecture Notes in Computer Science ; 5921, 6 ; 433-445
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2009-01-01
-
Size:13 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Subspace CodesKhaleghi, Azadeh / Silva, Danilo / Kschischang, Frank R. et al. | 2009
- 22
-
On Linear Programming Decoding on a Quantized Additive White Gaussian Noise ChannelRosnes, Eirik et al. | 2009
- 38
-
Codes as Modules over Skew Polynomial RingsBoucher, Delphine / Ulmer, Felix et al. | 2009
- 56
-
On Higher Weights and Code ExistenceSchaathun, Hans Georg et al. | 2009
- 65
-
Mass Formula for Even Codes overBetsumiya, Koichi / Betty, Rowena Alma L. / Munemasa, Akihiro et al. | 2009
- 78
-
On the Classification of Self-dual -CodesHarada, Masaaki / Munemasa, Akihiro et al. | 2009
- 91
-
On Linear Codes from Maximal CurvesFanali, Stefania et al. | 2009
- 112
-
On Linear Cryptanalysis with Many Linear ApproximationsGérard, Benoît / Tillich, Jean-Pierre et al. | 2009
- 133
-
Bivium as a Mixed-Integer Linear Programming ProblemBorghoff, Julia / Knudsen, Lars R. / Stolpe, Mathias et al. | 2009
- 153
-
Security of Cyclic Double Block Length Hash FunctionsFleischmann, Ewan / Gorski, Michael / Lucks, Stefan et al. | 2009
- 176
-
Another Glance at Double-Length HashingÖzen, Onur / Stam, Martijn et al. | 2009
- 202
-
Geometric Ideas for Cryptographic Equation Solving in Even CharacteristicMurphy, Sean / Paterson, Maura B. et al. | 2009
- 222
-
Provably Secure Code-Based Threshold Ring SignaturesDallot, Léonard / Vergnaud, Damien et al. | 2009
- 236
-
A New Protocol for the Nearby Friend ProblemChatterjee, Sanjit / Karabina, Koray / Menezes, Alfred et al. | 2009
- 252
-
Distributing the Key Distribution Centre in Sakai–Kasahara Based SystemsGeisler, Martin / Smart, Nigel P. et al. | 2009
- 263
-
Key Predistribution Schemes and One-Time Broadcast Encryption Schemes from Algebraic Geometry CodesChen, Hao / Ling, San / Padró, Carles / Wang, Huaxiong / Xing, Chaoping et al. | 2009
- 278
-
Attribute-Based Encryption Supporting Direct/Indirect Revocation ModesAttrapadung, Nuttapong / Imai, Hideki et al. | 2009
- 301
-
Certificate-Free Attribute AuthenticationKhader, Dalia / Chen, Liqun / Davenport, James H. et al. | 2009
- 326
-
Comparing with RSACathalo, Julien / Naccache, David / Quisquater, Jean-Jacques et al. | 2009
- 336
-
Double-Exponentiation in Factor-4 Groups and Its ApplicationsKarabina, Koray et al. | 2009
- 351
-
Oracle-Assisted Static Diffie-Hellman Is Easier Than Discrete LogarithmsJoux, Antoine / Lercier, Reynald / Naccache, David / Thomé, Emmanuel et al. | 2009
- 368
-
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm ProblemsGalbraith, Steven / Ruprai, Raminder S. et al. | 2009
- 383
-
On Designs and Multiplier Groups Constructed from Almost Perfect Nonlinear FunctionsEdel, Yves / Pott, Alexander et al. | 2009
- 402
-
A New Family of Hyper-Bent Boolean Functions in Polynomial FormMesnager, Sihem et al. | 2009
- 418
-
The Rayleigh Quotient of Bent FunctionsDanielsen, Lars Eirik / Parker, Matthew G. / Solé, Patrick et al. | 2009
- 433
-
Cache Timing Analysis of LFSR-Based Stream CiphersLeander, Gregor / Zenner, Erik / Hawkes, Philip et al. | 2009
- 446
-
Optimal Recovery of Secret Keys from Weak Side Channel TracesSchindler, Werner / Walter, Colin D. et al. | 2009
- 469
-
Practical Zero-Knowledge Proofs for Circuit EvaluationGhadafi, Essam / Smart, Nigel P. / Warinschi, Bogdan et al. | 2009