A practical key recovery attack on basic TCHo
M Herrmann, G Leander - International Workshop on Public Key …, 2009 - Springer
… In this paper we show, that TCHo cannot be used without this construction. We present a
chosen ciphertext attack on basic TCHo that recovers the secret key after approximately d3/2 …
chosen ciphertext attack on basic TCHo that recovers the secret key after approximately d3/2 …
TCHo: A Code-Based Cryptosystem
A Duc, S Vaudenay - Advances in Network Analysis and its Applications, 2012 - Springer
… mount a key recovery chosen ciphertext attack, which seemingly proves that the key recovery
… 7.2 we describe our notation and give basic definitions used throughout the paper. In Sect. …
… 7.2 we describe our notation and give basic definitions used throughout the paper. In Sect. …
When stream cipher analysis meets public-key cryptography
M Finiasz, S Vaudenay - International Workshop on Selected Areas in …, 2006 - Springer
… Inspired by fast correlation attacks on stream ciphers, we … We believe TCHo could also
fit on a passive RFID tag. … The main idea is to isolate one linear feedback shift-registers (LFSR) …
fit on a passive RFID tag. … The main idea is to isolate one linear feedback shift-registers (LFSR) …
Improved algorithms for finding low-weight polynomial multiples in and some cryptographic applications
C Löndahl, T Johansson - Designs, codes and cryptography, 2014 - Springer
… show a key-recovery attack against … main result in this paper, we consider the problem of
finding a polynomial multiple of weight 4, which is a very relevant problem in correlation attacks …
finding a polynomial multiple of weight 4, which is a very relevant problem in correlation attacks …
An approach for stream ciphers design based on joint computing over random and secret data
MJ Mihaljević, H Imai - Computing, 2009 - Springer
… The trapdoor cipher TCHo has been proposed in [1] where the additive noise has been …
are basic approaches for cryptanalysis of any stream cipher: (i) the generic key recovery attacks …
are basic approaches for cryptanalysis of any stream cipher: (i) the generic key recovery attacks …
[BOOK][B] Public Key Cryptography-PKC 2009: 12th International Conference on Practice and Theory in Public Key Cryptography Irvine, CA, USA, March 18-20, 2009 …
It has been a real pleasure to have taken part in organizing the 12th International Conference
on Practice and Theory in Public Key Cryptography (PKC 2009). PKC 2009 was held …
on Practice and Theory in Public Key Cryptography (PKC 2009). PKC 2009 was held …
[PDF][PDF] On Certain Approaches for Analysis and Design of Cryptographic Techniques for Symmetric Encryption and Key Management
MJ Mihaljevic - SELECTED TOPICS ON IMAGE PROCESSING AND …, 2012 - elibrary.math.rs
… The main goal of this section is to discuss the algorithm … The trapdoor cipher TCHo has
been proposed in [66] where the … :(i) the generic key recovery attacks based on different search …
been proposed in [66] where the … :(i) the generic key recovery attacks based on different search …
Bringing Theory Closer to Practice in Post-quantum and Leakage-resilient Cryptography
AR Duc - 2015 - infoscience.epfl.ch
… evaluation framework [SMY09] for side-channel key recovery attacks introduced by Standaert
et al. In particular, we re-state the main proof of Chapter 9 for the masking countermeasure …
et al. In particular, we re-state the main proof of Chapter 9 for the masking countermeasure …
Secure application partitioning for intellectual property protection
CW O'Donnell - 2005 - dspace.mit.edu
… Attacks, we can cover all possible security threats given the assumptions we have made in
on our model. Algorithm 1 gives basic pseudo-code describing how any Memoization Attack …
on our model. Algorithm 1 gives basic pseudo-code describing how any Memoization Attack …
Some notes on code-based cryptography
C Löndahl - 2015 - portal.research.lu.se
… Our results show that the new squaring attack allows for … of the instances used by the TCHo
cryptosystem. Secondly, we … This section introduces some basic concepts on probability …
cryptosystem. Secondly, we … This section introduces some basic concepts on probability …