National Repository of Grey Literature 3 records found  Search took 0.00 seconds. 
Cryptanalytic attacks on the cipher PRINCE
Tvrdý, David ; Göloglu, Faruk (advisor) ; Klíma, Vlastimil (referee)
This work surveys and studies the most practical attacks on round reduced versions of the cipher PRINCE. Specifically, concepts of integral cryptanalysis and meet-in-the- middle attacks are discussed. A new 4.5-round integral distinguisher with lower time and data complexity is presented. A new meet-in-the-middle attack on seven rounds of the cipher with low data complexity is proposed. A Python 3 reference implementation of the cipher as well as of some of the integral attacks is provided. 1
Side channel attack in cryptanalysis of symmetri and asymmetric schemes
Hlaváč, Martin ; Rosa, Tomáš (advisor) ; Klíma, Vlastimil (referee) ; Tůma, Jiří (referee)
The work summarizes author's three main results during the doctoral studies published at SAC '06 and CHES '09 conferences and the journal IET Information Security. The first two results are the side channel attacks on asymmetric schemes RSA and DSA. They are both based on the theory of lattices and are motivated by modern technologies such as Intel Pentium 4 HTT processor and the electronic passport. The last result is more technology related. It describes the method that provides optical side information and that was empoyed for the first time for the cryptanalytic purposes by the author. As an application, an attack on symmetric cipher AES running on a simple and widespread microcontroller PIC16F84A is presented.
Side channel attack in cryptanalysis of symmetri and asymmetric schemes
Hlaváč, Martin ; Rosa, Tomáš (advisor) ; Klíma, Vlastimil (referee) ; Tůma, Jiří (referee)
The work summarizes author's three main results during the doctoral studies published at SAC '06 and CHES '09 conferences and the journal IET Information Security. The first two results are the side channel attacks on asymmetric schemes RSA and DSA. They are both based on the theory of lattices and are motivated by modern technologies such as Intel Pentium 4 HTT processor and the electronic passport. The last result is more technology related. It describes the method that provides optical side information and that was empoyed for the first time for the cryptanalytic purposes by the author. As an application, an attack on symmetric cipher AES running on a simple and widespread microcontroller PIC16F84A is presented.

See also: similar author names
2 KLÍMA, Vilém
2 Klíma, Vladimír
2 Klíma, Václav
Interested in being notified about new results for this query?
Subscribe to the RSS feed.