-
1
-
-
38149142875
-
Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers, Cryptology ePrint Archive
-
Report 2007/024
-
Bard, G., Courtois, N., Jefferson, C.: Efficient Methods for Conversion and Solution of Sparse Systems of Low-Degree Multivariate Polynomials over GF(2) via SAT-Solvers, Cryptology ePrint Archive, Report 2007/024
-
-
-
Bard, G.1
Courtois, N.2
Jefferson, C.3
-
2
-
-
0242404236
-
-
Biryukov, A., De Cannière, C.: Block Ciphers and Systems of Quadratic Equations. In: Johansson, T. (ed.) FSE 2003. LNCS, 2887, pp. 274-289. Springer, Heidelberg (2003)
-
Biryukov, A., De Cannière, C.: Block Ciphers and Systems of Quadratic Equations. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 274-289. Springer, Heidelberg (2003)
-
-
-
-
3
-
-
38049070243
-
-
Biryukov, A., Khovratovich, D.: Two New Techniques of Side-Channel Cryptanalysis. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, 4727, pp. 195-208. Springer, Heidelberg (2007)
-
Biryukov, A., Khovratovich, D.: Two New Techniques of Side-Channel Cryptanalysis. In: Paillier, P., Verbauwhede, I. (eds.) CHES 2007. LNCS, vol. 4727, pp. 195-208. Springer, Heidelberg (2007)
-
-
-
-
4
-
-
38549140491
-
-
Bogdanov, A.: Improved Side-Channel Collision Attacks on AES. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, 4876, pp. 84-95. Springer, Heidelberg (2007)
-
Bogdanov, A.: Improved Side-Channel Collision Attacks on AES. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 84-95. Springer, Heidelberg (2007)
-
-
-
-
5
-
-
58549114936
-
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection
-
Chowdhury, D.R, Rijmen, V, Das, A, eds, INDOCRYPT 2008, Springer, Heidelberg
-
Bogdanov, A., Kizhvatov, I., Pyshkin, A.: Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 251-265. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5365
, pp. 251-265
-
-
Bogdanov, A.1
Kizhvatov, I.2
Pyshkin, A.3
-
6
-
-
33745654751
-
-
Buchmann, J., Pyshkin, A., Weinmann, R.-P.: Block Ciphers Sensitive to Gröbner Basis Attacks. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, 3860, pp. 313-331. Springer, Heidelberg (2006)
-
Buchmann, J., Pyshkin, A., Weinmann, R.-P.: Block Ciphers Sensitive to Gröbner Basis Attacks. In: Pointcheval, D. (ed.) CT-RSA 2006. LNCS, vol. 3860, pp. 313-331. Springer, Heidelberg (2006)
-
-
-
-
7
-
-
33746903957
-
Generalizing Square Attack using Side-Channels of an AES Implementation on an FPGA
-
Tampere, Finland, August, 2005
-
Carlier, V., Chabanne, H., Dottax, E., Pelletier, H.: Generalizing Square Attack using Side-Channels of an AES Implementation on an FPGA. In: The proceedings of FPL 2005, Tampere, Finland, August 2005, pp. 433-437 (2005)
-
(2005)
The proceedings of FPL
, pp. 433-437
-
-
Carlier, V.1
Chabanne, H.2
Dottax, E.3
Pelletier, H.4
-
8
-
-
70350587605
-
-
http://www.princeton.edu/~chaff/
-
-
-
-
9
-
-
35248899532
-
-
Chari, S., Rao, J., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, 2523, pp. 13-28. Springer, Heidelberg (2003)
-
Chari, S., Rao, J., Rohatgi, P.: Template Attacks. In: Kaliski Jr., B.S., Koç, Ç.K., Paar, C. (eds.) CHES 2002. LNCS, vol. 2523, pp. 13-28. Springer, Heidelberg (2003)
-
-
-
-
10
-
-
84958765510
-
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
-
Zheng, Y, ed, ASIACRYPT 2002, Springer, Heidelberg
-
Courtois, N., Pieprzyk, J.: Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In: Zheng, Y. (ed.) ASIACRYPT 2002. LNCS, vol. 2501, pp. 267-287. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2501
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.2
-
11
-
-
38149068190
-
Algebraic Cryptanalysis of the Data Encryption Standard
-
Galbraith, S.D, ed, Cryptography and Coding 2007, Springer, Heidelberg
-
Courtois, N., Bard, G.: Algebraic Cryptanalysis of the Data Encryption Standard. In: Galbraith, S.D. (ed.) Cryptography and Coding 2007. LNCS, vol. 4887, pp. 274-289. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4887
, pp. 274-289
-
-
Courtois, N.1
Bard, G.2
-
12
-
-
70350615150
-
-
Faugère, J.-C.: Groebner Bases. In: Applications in Cryptology, FSE 2007, Invited Talk (2007), http://fse2007.uni.lu/slides/faugere.pdf
-
Faugère, J.-C.: Groebner Bases. In: Applications in Cryptology, FSE 2007, Invited Talk (2007), http://fse2007.uni.lu/slides/faugere.pdf
-
-
-
-
13
-
-
70350585636
-
-
FIPS 197, Advanced Encryption Standard, Federal Information Processing Standard, NIST, U.S. Dept. of Commerce, November 26 (2001)
-
FIPS 197, "Advanced Encryption Standard," Federal Information Processing Standard, NIST, U.S. Dept. of Commerce, November 26 (2001)
-
-
-
-
14
-
-
0001788107
-
Algorithms for the Satisfiability problem: A survey
-
American Mathematical Society, Providence
-
Gu, J., Purdom, P.W., Franco, J., Wah, B.: Algorithms for the Satisfiability problem: a survey. DIMACS Series on Discrete Mathematics and Theoretical Computer Science, vol. 35, pp. 19-151. American Mathematical Society, Providence (1997)
-
(1997)
DIMACS Series on Discrete Mathematics and Theoretical Computer Science
, vol.35
, pp. 19-151
-
-
Gu, J.1
Purdom, P.W.2
Franco, J.3
Wah, B.4
-
15
-
-
38149026169
-
-
Handschuh, H., Preneel, B.: Blind Differential Cryptanalysis for Enhanced Power Attacks. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, 4356, pp. 163-173. Springer, Heidelberg (2007)
-
Handschuh, H., Preneel, B.: Blind Differential Cryptanalysis for Enhanced Power Attacks. In: Biham, E., Youssef, A.M. (eds.) SAC 2006. LNCS, vol. 4356, pp. 163-173. Springer, Heidelberg (2007)
-
-
-
-
16
-
-
33746589805
-
-
Herbst, C., Oswald, E., Mangard, S.: An AES Smart Card Implementation Resistant to Power Analysis Attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, 3989, pp. 239-252. Springer, Heidelberg (2006)
-
Herbst, C., Oswald, E., Mangard, S.: An AES Smart Card Implementation Resistant to Power Analysis Attacks. In: Zhou, J., Yung, M., Bao, F. (eds.) ACNS 2006. LNCS, vol. 3989, pp. 239-252. Springer, Heidelberg (2006)
-
-
-
-
17
-
-
84939573910
-
Differential Power Analysis
-
Wiener, M, ed, CRYPTO 1999, Springer, Heidelberg
-
Kocher, P., Jaffe, J., Jun, B.: Differential Power Analysis. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 398-412. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 398-412
-
-
Kocher, P.1
Jaffe, J.2
Jun, B.3
-
18
-
-
35048824462
-
-
Ledig, H., Muller, F., Valette, F.: Enhancing Collision Attacks. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 176-190. Springer, Heidelberg (2004)
-
Ledig, H., Muller, F., Valette, F.: Enhancing Collision Attacks. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 176-190. Springer, Heidelberg (2004)
-
-
-
-
19
-
-
35248892041
-
A Simple Power-Analysis (SPA) Attackon Implementations of the AES Key Expansion
-
Lee, P.J, Lim, C.H, eds, ICISC 2002, Springer, Heidelberg
-
Mangard, S.: A Simple Power-Analysis (SPA) Attackon Implementations of the AES Key Expansion. In: Lee, P.J., Lim, C.H. (eds.) ICISC 2002. LNCS, vol. 2587, pp. 343-358. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2587
, pp. 343-358
-
-
Mangard, S.1
-
20
-
-
33744946821
-
-
Oswald, E., Schramm, K.: An Efficient Masking Scheme for AES Software Implementations. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, 3786, pp. 292-305. Springer, Heidelberg (2006)
-
Oswald, E., Schramm, K.: An Efficient Masking Scheme for AES Software Implementations. In: Song, J.-S., Kwon, T., Yung, M. (eds.) WISA 2005. LNCS, vol. 3786, pp. 292-305. Springer, Heidelberg (2006)
-
-
-
-
21
-
-
77952354675
-
A Block Cipher based PRNG Secure Against Side-Channel Key Recovery
-
Tokyo, Japan, March, 2008
-
Petit, C., Standaert, F.-X., Pereira, O., Malkin, T.G., Yung, M.: A Block Cipher based PRNG Secure Against Side-Channel Key Recovery. In: The proceedings of ASIACCS 2008, Tokyo, Japan, March 2008, pp. 56-65 (2008)
-
(2008)
The proceedings of ASIACCS
, pp. 56-65
-
-
Petit, C.1
Standaert, F.-X.2
Pereira, O.3
Malkin, T.G.4
Yung, M.5
-
22
-
-
67650675583
-
-
Pietrzak, K.: A Leakage-Resilient Mode of Operation. In: Joux, A. (ed.) Eurocrypt 2009. LNCS, 5479, pp. 462-482. Springer, Heidelberg (2009)
-
Pietrzak, K.: A Leakage-Resilient Mode of Operation. In: Joux, A. (ed.) Eurocrypt 2009. LNCS, vol. 5479, pp. 462-482. Springer, Heidelberg (2009)
-
-
-
-
23
-
-
70350611529
-
-
Renauld, M., Standaert, F.-X.: Algebraic Side-Channel Attacks, Cryptology ePrint Archive, report 2009/179, http://eprint.iacr.org/2009/279
-
Algebraic Side-Channel Attacks, Cryptology ePrint Archive, report 2009/179
-
-
Renauld, M.1
Standaert, F.-X.2
-
24
-
-
0242571732
-
-
Schramm, K., Wollinger, T.J., Paar, C.: A New Class of Collision Attacks and Its Application to DES. In: Johansson, T. (ed.) FSE 2003. LNCS, 2887, pp. 206-222. Springer, Heidelberg (2003)
-
Schramm, K., Wollinger, T.J., Paar, C.: A New Class of Collision Attacks and Its Application to DES. In: Johansson, T. (ed.) FSE 2003. LNCS, vol. 2887, pp. 206-222. Springer, Heidelberg (2003)
-
-
-
-
25
-
-
35048895383
-
-
Schramm, K., Leander, G., Felke, P., Paar, C.: A Collision-Attack on AES: Combining Side Channel and Differential Attack. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, 3156, pp. 163-175. Springer, Heidelberg (2004)
-
Schramm, K., Leander, G., Felke, P., Paar, C.: A Collision-Attack on AES: Combining Side Channel and Differential Attack. In: Joye, M., Quisquater, J.-J. (eds.) CHES 2004. LNCS, vol. 3156, pp. 163-175. Springer, Heidelberg (2004)
-
-
-
|