Narrow your search

Library

KBR (27)

KU Leuven (27)

ULiège (17)

UAntwerpen (13)

UGent (11)

UCLouvain (2)

VUB (2)

Belgian Parliament (1)

KMSKA (1)

UHasselt (1)

More...

Resource type

book (24)

dissertation (4)


Language

English (23)

Dutch (3)

French (1)


Year
From To Submit

2009 (1)

2005 (1)

1998 (1)

1996 (1)

1995 (1)

More...
Listing 1 - 10 of 27 << page
of 3
>>
Sort by

Dissertation
Motion estimation and motion compensation for image sequence coding
Authors: ---
ISBN: 9056820362 Year: 1996 Publisher: Heverlee Katholieke Universiteit Leuven. Faculteit der Toegepaste Wetenschappen. Departement Elektrotechniek. Afdeling Elektronica, Systemen, Automatisatie en Technologie

Measuring information : an information services perspective
Author:
ISBN: 0126826609 Year: 1995 Volume: *26 Publisher: San Diego Academic Press


Multi
System-level power optimization of data storage and transfer : proefschrift... : Oktober 1998
Authors: ---
ISBN: 9056821458 Year: 1998 Publisher: Heverlee Katholieke Universiteit Leuven. Faculteit der Toegepaste Wetenschappen


Dissertation
White-box cryptography
Authors: ---
ISBN: 9789460180408 Year: 2009 Publisher: Leuven Katholieke Universiteit Leuven

Loading...
Export citation

Choose an application

Bookmark

Abstract

Deze thesis bestudeert het onderwerp 'white-box cryptografie' (WBC), dat zich op software-implementaties van cryptografische primitieven (zoals vercijferingsschema's) concentreert. Traditioneel worden cryptografische primitieven ontworpen om gegevens en sleutels te beschermen tegen 'black-box' aanvallen. Hierbij heeft de aanvaller kennis van het algoritme en kan hij de invoer naar en de uitvoer van het primitief bestuderen. Maar hij heeft geen zicht op de interne werking van een sleutel-geinstantieerd primitief tijdens de uitvoering (zwarte doos). In deze thesis beschouwen we een aanvalsmodel waarbij de aanvaller onbeperkte toegang heeft tot de software-implementatie: het white-box model. Het doel van white-box implementaties is om in een dergelijke context een bepaald niveau van bescherming te bekomen. Het belangrijkste deel van deze thesis behandelt het nagaan van de veiligheid van white-box implementaties. Deze bijdrage is tweezijdig. Allereerst worden de praktische white-box implementaties van DES en AES vercijferingsalgoritmen beschreven, en hun cryptanalyse voorgesteld. Deze resultaten worden verder uitgebreid naar generische aanvallen, wat het pad opent naar nieuwe technieken. Aangezien nog geen formele definities van white-box cryptografie voorgesteld werden en de praktische white-box implementaties zonder bewijs van veiligheid voorzien zijn, dringt zich een studie op naar het formeel definieren van white-box cryptografie. Dit is de tweede grote bijdrage. De studie van theoretische obfuscatie en bewijsbare veiligheid resulteert in een definitie van WBC, waarbij we de veiligheidsvereisten omvatten voor een bepaald cryptografisch primitief met geassocieerde veiligheidsnotie. Dit nieuw theoretisch model levert een context op, waarin de veiligheid van white-box implementaties bestudeerd kan worden, en leidt tot een aantal positieve en negatieve resultaten. Gezien de praktische mogelijkheden die kunnen voortvloeien uit WBC, beeindigen we deze thesis met een overzicht van een selectie van toepassingen en verwante onderzoeksdomeinen, aan welke dit onderzoek kan toe bijdragen. This thesis studies the topic of 'white-box cryptography' (WBC), which focuses on software implementations of cryptographic primitives (such as encryption schemes). Traditionally, cryptographic primitives are designed to protect data and keys against 'black-box' attacks. In such a context, an adversary has knowledge of the algorithm and may examine various inputs to and outputs from the system, but has no visibility on the internal details of the execution of a key instantiated primitive. In contrast, the goal of white-box implementations is to provide a degree of robustness against attacks from the execution environment. In such an environment, an adversary has unrestricted access to the software implementation. The main part of this dissertation covers the security assessment of white-box implementations. This contribution is two-fold: we study practical white-box techniques and perform a theoretical study. First, a study is conducted on the practical white-box implementations of DES and AES encryption algorithms, which includes their cryptanalysis. Subsequently, generic cryptanalysis results are described, which opens a discussion towards white-box design strategies. Since no formal definitions of white-box cryptography were presented before and the proposed white-box implementations did not come with any proof of security, we initiate a study towards a theoretical model for white-box cryptography. The study on formal models of obfuscation and provable security leads to a definition where we capture the security requirements of WBC defined over some cryptographic scheme and a security notion. This new theoretical model provides a context to investigate the security of white-box implementations, which leads to a number of positive and negative possibility results. Considering the practical interest of research in WBC, we conclude with an overview of a selection of applications and related research fields that might benefit from and contribute to this research topic. praktische mogelijkheden die kunnen voortvloeien uit WBC, beeindigen we deze thesis met een overzicht van een selectie van toepassingen en verwante onderzoeksdomeinen, aan welke dit onderzoek kan toe bijdragen. and related research fields that might benefit from and contribute to this research topic.

Algebraic coding : first French-Soviet workshop, Paris, July 22-24, 1991 : proceedings
Author:
ISBN: 0387551301 3540551301 3540467394 Year: 1992 Publisher: Berlin New York Springer-Verlag

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume presents the proceedings of the first French-Soviet workshop on algebraic coding, held in Paris in July 1991. The idea for the workshop, born in Leningrad (now St. Petersburg) in 1990, was to bring together some of the best Soviet coding theorists. Scientists from France, Finland, Germany, Israel, Italy, Spain, and the United States also attended. The papers in the volume fall rather naturally into four categories: - Applications of exponential sums - Covering radius - Constructions -Decoding.

Applied algebra, algebraic algorithms, and error-correcting codes : 9th International Symposium, AAECC-9, New Orleans, LA, USA, October 1991 : proceedings
Authors: ---
ISBN: 3540545220 0387545220 3540384367 Year: 1991 Volume: vol 539 Publisher: Berlin New York Springer-Verlag

Loading...
Export citation

Choose an application

Bookmark

Abstract

The AAECC conferences focus on the algebraic aspects of modern computer science, which includes the most up-to-date and advanced topics. The topic of error-correcting codes is one where theory and implementation are unifiedinto a subject both of mathematical beauty and of practical importance. Algebraic algorithms are not only interesting theoretically but also important in computer and communication engineering and many other fields. This volume contains the proceedings of the 9th AAECC conference, held in New Orleans, LA, in October 1991. Researchers from Europe, America, Japan and other regions of the world presented papers at the conference. The papers present new results of recent theoretical and application-oriented research in the field.

Keywords

Algebra --- -Algorithms --- -Error-correcting codes (Information theory) --- -681.3*E4 --- Codes, Error-correcting (Information theory) --- Error-detecting codes (Information theory) --- Forbidden-combination check (Information theory) --- Self-checking codes (Information theory) --- Artificial intelligence --- Automatic control --- Coding theory --- Information theory --- Algorism --- Arithmetic --- Mathematics --- Mathematical analysis --- Data processing --- -Congresses --- Congresses --- Coding and information theory: data compaction and compression; formal modelsof communication; nonsecret encoding schemes--See also {681.3*H11} --- Foundations --- Algorithms --- Error-correcting codes (Information theory) --- Congresses. --- 681.3*E4 Coding and information theory: data compaction and compression; formal modelsof communication; nonsecret encoding schemes--See also {681.3*H11} --- 681.3*E4 --- Data processing&delete& --- Error-correcting codes (Information theory) - Congresses. --- Algebra - Data processing - Congresses. --- Algorithms - Congresses. --- Algebra. --- Information theory. --- Coding theory. --- Combinatorics. --- Discrete Mathematics. --- Theory of Computation. --- Coding and Information Theory. --- Symbolic and Algebraic Manipulation. --- Data processing. --- Combinatorics --- Data compression (Telecommunication) --- Digital electronics --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Communication theory --- Communication --- Cybernetics

Listing 1 - 10 of 27 << page
of 3
>>
Sort by