Skip to main content

and
Your search also matched 7 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Privacy-Preserving Distributed Economic Dispatch Protocol for Smart Grid

Include preview-only content
  1. Chapter and Conference Paper

    Towards Symbolic Encryption Schemes

    Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic ...

    Naveed Ahmed, Christian D. Jensen, Erik Zenner in Computer Security – ESORICS 2012 (2012)

  2. Chapter and Conference Paper

    Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations

    At CHES 2010, the new block cipher PRINTcipher was presented. In addition to using an xor round key as is common practice for round-based block ciphers, PRINTcipher also uses key-dependent permutations. While thi...

    Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner in Fast Software Encryption (2011)

  3. Chapter and Conference Paper

    A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack

    At CHES 2010, the new block cipher PRINTcipher was presented as a light-weight encryption solution for printable circuits [15]. The best attack to date is a differential attack [1] that breaks less than half of t...

    Gregor Leander, Mohamed Ahmed Abdelraheem in Advances in Cryptology – CRYPTO 2011 (2011)

  4. Chapter and Conference Paper

    Cryptanalysis of ARMADILLO2

    ARMADILLO2 is the recommended variant of a multipurpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper, we describe a meet-in-the-middle technique r...

    Mohamed Ahmed Abdelraheem, Céline Blondeau in Advances in Cryptology – ASIACRYPT 2011 (2011)

  5. Chapter and Conference Paper

    A Cache Timing Analysis of HC-256

    In this paper, we describe a cache-timing attack against the stream cipher HC-256, which is the strong version of eStream winner HC-128. The attack is based on an abstract model of cache timing attacks that ca...

    Erik Zenner in Selected Areas in Cryptography (2009)