#### Filter Results:

- Full text PDF available (9)

#### Publication Year

1995

2017

- This year (1)
- Last 5 years (10)
- Last 10 years (13)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Carlo Harpes, Gerhard G. Kramer, James L. Massey
- EUROCRYPT
- 1995

Matsui's linear cryptanalysis for iterated block ciphers is generalized by replacing his linear expressions with I/O sums. For a single round, an I/O sum is the XOR of a balanced binary-valued function of the round input and a balanced binary-valued function of the round output. The basic attack is described and conditions for it to be successful are given.… (More)

- Carlo Harpes, James L. Massey
- FSE
- 1997

Matsui's linear cryptanalysis for iterated block ciphers is generalized to an attack called . This attack exploits a weakness that can be described by an e ective partition-pair, i.e., a partition of the plaintext set and a partition of the next-to-last-round output set such that, for every key, the next-to-last-round outputs are non-uniformly distributed… (More)

- Carlo Harpes
- 1996

The paper presents a general setting which is used to describe generalized linear and partitioning cryptanalysis. A measure of non-uniformity called imbalance similar to Matsui's bias is deened. Some upper bounds for this measure are presented and used to estimate a cipher's resistance to each of the two attacks. The bounds reveal that there exists a uniied… (More)

- Benoît Jager, Carlo Harpes
- 2009

This paper describes deliberate threats to the Galileo localisation system and then suggests security features which can provide localisation assurance i.e. that can prove that a given device was at a given location at a given time. Security objectives are then derived, which can be used to identify and assess appropriate countermeasures such as a tamper… (More)

- Olga Gadyatskaya, Carlo Harpes, Sjouke Mauw, Cédric Muller, Steve Muller
- GraMSec@CSF
- 2016

- Paolo Capodieci, Stefano Diblasi, +21 authors Matthieu Aubigny
- COMPENG
- 2010

This paper illustrates the activities under development within the FP7 EU MICIE project. The project is devoted to design and implement an on-line alerting system, able to evaluate, in real time, the level of risk of interdependent Critical Infrastructures (CIs). Such a risk is generated by undesired events and by the high level of interconnection of the… (More)

- Xihui Chen, C. Harpes, G. Lenzini, M. Martins, S. Mauw, Jun Pang
- 2012 6th ESA Workshop on Satellite Navigation…
- 2012

Existing Global Navigation Satellite Systems offer no authentication to the open service signals and so stand-alone receivers are vulnerable to meaconing and spoofing attacks. These attacks interfere with the integrity and authenticity of satellite signals: they can delay signals, or re-broadcast signals. Positioning is thus compromised and location-based… (More)

- Xihui Chen, Carlo Harpes, Gabriele Lenzini, Sjouke Mauw, Jun Pang
- ERCIM News
- 2013

- Xihui Chen, Carlo Harpes, Gabriele Lenzini, Miguel Martins, Sjouke Mauw, Jun Pang
- ACM Conference on Computer and Communications…
- 2013

Through real-life experiments, it has been proved that spoofing is a practical threat to applications using the free civil service provided by Global Navigation Satellite Systems (GNSS). In this paper, we demonstrate a prototype that can verify the integrity of GNSS civil signals. By integrity we intuitively mean that civil signals originate from a GNSS… (More)