Results 1 -
4 of
4
From skew-cyclic codes to asymmetric quantum codes
- Adv. Math. Commun
, 2011
"... (AIMS) This paper was published in Advances in Mathematics of Communications and is made available as an electronic reprint (preprint) with permission of The American Institute of Mathematical Sciences AIMS.The paper can be found at ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
(AIMS) This paper was published in Advances in Mathematics of Communications and is made available as an electronic reprint (preprint) with permission of The American Institute of Mathematical Sciences AIMS.The paper can be found at
Pure Asymmetric Quantum MDS Codes from CSS Construction: A Complete Characterization
"... ar ..."
(Show Context)
A Secure Implementation of a Symmetric Encryption Algorithm in White-Box Attack Contexts
"... In a white-box context, an adversary has total visibility of the implementation of the cryptosystem and full control over its execution platform. As a countermeasure against the threat of key compromise in this context, a new secure implementation of the symmetric encryption algorithm SHARK is prop ..."
Abstract
- Add to MetaCart
(Show Context)
In a white-box context, an adversary has total visibility of the implementation of the cryptosystem and full control over its execution platform. As a countermeasure against the threat of key compromise in this context, a new secure implementation of the symmetric encryption algorithm SHARK is proposed. The general approach is to merge several steps of the round function of SHARK into table lookups, blended by randomly generated mixing bijections. We prove the soundness of the implementation of the algorithm and analyze its security and efficiency. The implementation can be used in web hosts, digital right management devices, and mobile devices such as tablets and smart phones. We explain how the design approach can be adapted to other symmetric encryption algorithms with a slight modification.