Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Dobraunig, Christoph"'
Publikováno v:
In Microprocessors and Microsystems July 2017 52:470-479
Publikováno v:
IACR Transactions on Symmetric Cryptology; Volume 2023, Issue 2; 69-93
Universal hash functions play a prominent role in the design of message authentication codes and the like. Whereas it is known how to build highly efficient sequential universal hash functions, parallel non-algebraic universal hash function designs a
Autor:
Ankele, Ralph, Dobraunig, Christoph, Guo, Jian, Lambooij, Eran, Leander, Gregor, Todo, Yosuke
Publikováno v:
IACR Transactions on Symmetric Cryptology, Vol 2019, Iss 1 (2019)
IACR Transactions on Symmetric Cryptology, 2019, 1, pp. 192-235
IACR Transactions on Symmetric Cryptology, 2019, 192-235
IACR Transactions on Symmetric Cryptology 1–43
IACR Transactions on Symmetric Cryptology; Volume 2019, Issue 1; 192-235
IACR Transactions on Symmetric Cryptology, 2019, 1, pp. 192-235
IACR Transactions on Symmetric Cryptology, 2019, 192-235
IACR Transactions on Symmetric Cryptology 1–43
IACR Transactions on Symmetric Cryptology; Volume 2019, Issue 1; 192-235
The design and analysis of dedicated tweakable block ciphers is a quite recent and very active research field that provides an ongoing stream of new insights. For instance, results of Kranz, Leander, and Wiemer from FSE 2017 show that the addition of
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
In Information Processing Letters July 2020 159-160
Autor:
Daemen, Joan, Dobraunig, Christoph, Eichlseder, Maria, Gross, Hannes, Mendel, Florian, Primas, Robert
Statistical Ineffective Fault Attacks (SIFA) pose a threat for many practical implementations of symmetric primitives. Countermeasures against both power analysis and fault attacks typically do not prevent straightforward SIFA attacks, which require
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=sygma_______::dcdef0f54fa1f2ac030e364e2feb4c22
https://doi.org/10.13154/tches.v2020.i3.508-543
https://doi.org/10.13154/tches.v2020.i3.508-543
Autor:
Dobraunig, Christoph, Eichlseder, Maria, Korak, Thomas, Mangard, Stefan, Mendel, Florian, Primas, Robert
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2018, Iss 3 (2018)
Since the seminal work of Boneh et al., the threat of fault attacks has been widely known and techniques for fault attacks and countermeasures have been studied extensively. The vast majority of the literature on fault attacks focuses on the ability
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Dobraunig, Christoph, Eichlseder, Maria, Mangard, Stefan, Mendel, Florian, Unterluggauer, Thomas
Publikováno v:
IACR Transactions on Symmetric Cryptology, Pp 80-105 (2017)
IACR Transactions on Symmetric Cryptology
IACR Transactions on Symmetric Cryptology; Volume 2017, Issue 1; 80-105
IACR Transactions on Symmetric Cryptology
IACR Transactions on Symmetric Cryptology; Volume 2017, Issue 1; 80-105
Side-channel attacks and in particular differential power analysis (DPA) attacks pose a serious threat to cryptographic implementations. One approach to counteract such attacks are cryptographic schemes based on fresh re-keying. In settings of pre-sh
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5feb1b2e904f618c7d39ee82d33b0607
https://tosc.iacr.org/index.php/ToSC/article/view/585
https://tosc.iacr.org/index.php/ToSC/article/view/585