Publication

High performance VLSI architectures implementing strong cryptographic primitives

Publications associées (245)

Status of electron cyclotron wave technology

Minh Quang Tran

A review of the two key technologies for the electron cyclotron wave (ECW) system, the gyrotron source and the window, is presented. In both fields, significant progress has been made to meet the requirements of the heating and current drive systems planne ...
1998

State of the art in electronic payment systems

Philippe Janson

The exchange of goods conducted face-to-face between two parties dates back to before the beginning of recorded history. Traditional means of payment have always had security problems, but now electronic payments retain the same drawbacks and add some risk ...
1997

Overall Integrity of Service Control in TINA Networks

This article is concerned with protecting service control against interruption attacks. It investigates threats to service control in the Telecommunications Information Networking Architecture. Traditional security services protect message flows, but not s ...
Chapman & Hall1997

Cryptographic Protection of Connection Integrity with Interruption Detection in TINA

Uwe Wilhelm

The Telecommunications Information Networking Architecture (TINA) provides the architectural basis for the realization of telecommunications services as distributed applications. In particular application of distributed systems, new security problems arise ...
Chapman & Hall1997

XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications

Serge Vaudenay, Jacques Stern

Presents xmx (xor-multiply-xor), a new symmetric block cipher optimized for public-key libraries and microcontrollers with arithmetic coprocessors. xmx has no S-boxes and uses only modular multiplications and XORs. The complete scheme can be described by a ...
1997

Secure Communication in Distributed Ada

Jörg Kienzle

This document describes an implementation of secure communication for distributed applications in Ada 95. It explains the basics of cryptography and introduces the problem of key exchange. After a brief description of distributed systems in Ada 95, the mod ...
Springer Verlag1996

On the weak keys of Blowfish

Serge Vaudenay

Blowfish (Schneier, 1994) is a sixteen-rounds Feistel cipher (Feistel, 1973) in which the F function is a part of the private key. We show that the disclosure of F allows to perform a differential cryptanalysis which can recover all the rest of the key wit ...
1996

The Newton Channel

Serge Vaudenay

Simmons asked whether there exists a signature scheme with a broadband covert channel that does not require the sender to compromise the security of her signing key. We answer this question in the affirmative; the ElGamal signature scheme has such a channe ...
1996

KryptoKnight family of light-weight protocols for authentication and key distribution

Philippe Janson

An essential function for achieving security in computer networks is reliable authentication of communicating parties and network components. Such authentication typically relies on exchanges of cryptographic messages between the involved parties, which in ...
1995

Graph Chatbot

Chattez avec Graph Search

Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.

AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.