XMX: A Firmware-oriented Block Cipher Based on Modular Multiplications (1997)

by David M'Raïhi , David Naccache , Jacques Stern , Serge Vaudenay
Citations:2 - 0 self

Active Bibliography

54 Twofish: A 128-Bit Block Cipher – Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson - 1998
1 New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru – Eli Biham
3 ACE: The Advanced Cryptographic Engine – Thomas Schweinberger, Victor Shoup - 2000
52 Verifying secrets and rela-tive secrecy – Dennis Volpano, Geoffrey Smith - 2000
22 Exposing an RSA Private Key Given a Small Fraction of its Bits – Dan Boneh, Glenn Durfee, Yair Frankel - 1998
30 A Cautionary Note Regarding Evaluation of AES Candidates on Smart-Cards – Suresh Chari, Charanjit Jutla, Josyula R. Rao, Pankaj Rohatgi
48 Low-Cost Solutions for Preventing Simple Side-Channel Analysis: Side-Channel Atomicity – Benoît Chevallier-mames, Mathieu Ciet, Marc Joye - 2004
29 Provably Secure Masking of AES – Johannes Blömer, Jorge Guajardo Merchan, Volker Krümmel - 2004
203 Secure information flow in a multi-threaded imperative language – Geoffrey Smith, Dennis Volpano - 1998
162 Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems – Jean-Sebastien Coron - 1999
SEC 1: Elliptic . . . – n.n. - 2000
By – Abirami Prabhakaran
60 A Fast New DES Implementation in Software – Eli Biham - 1997
A Remote Authentication Model Using Smart Cards – Hakim L. Fourar
1 Exact analysis of exact change: the k-payment problem – Boaz Patt-shamir, Yiannis Tsiounis, Yair Frankel
1 Exact Analysis of Exact Change – Yair Frankel, Boaz Patt-Shamir, Yiannis Tsiounis - 1997
1 Finite field Multiplier Architectures for Cryptographic Applications – Mohamed El-gebaly - 2000
4 Undeniable Billing in Mobile Communication – Jianying Zhou, Kwok-Yan Lam - 1998
FIELDS OF STUDY – André Luiz, Moura Santos - 2000