Sciweavers

476 search results - page 49 / 96
» A New Attack against Khazad
Sort
View
IEEEIAS
2008
IEEE
14 years 4 months ago
Abusing SIP Authentication
The recent and massive deployment of Voice over IP infrastructures had raised the importance of the VoIP security and more precisely of the underlying signalisation protocol SIP. ...
Humberto J. Abdelnur, Tigran Avanesov, Michaë...
FSE
2006
Springer
95views Cryptology» more  FSE 2006»
14 years 1 months ago
Cryptanalysis of Achterbahn
We present several attacks against Achterbahn, one of the new stream ciphers proposed to the eSTREAM competition. Our best attack breaks the reduced version of the cipher with comp...
Thomas Johansson, Willi Meier, Frédé...
FSE
2008
Springer
162views Cryptology» more  FSE 2008»
13 years 11 months ago
Collisions on SHA-0 in One Hour
At Crypto 2007, Joux and Peyrin showed that the boomerang attack, a classical tool in block cipher cryptanalysis, can also be very useful when analyzing hash functions. They applie...
Stéphane Manuel, Thomas Peyrin
FC
2010
Springer
260views Cryptology» more  FC 2010»
13 years 11 months ago
Lightweight Cryptography and DPA Countermeasures: A Survey
Abstract. The dawning Ubiquitous Computing age demands a new attacker model for the myriads of pervasive computing devices used: since a potentially malicious user is in full contr...
Amir Moradi, Axel Poschmann
DAGSTUHL
2007
13 years 11 months ago
How Fast can be Algebraic Attacks on Block Ciphers?
In this paper we give a specification of a new block cipher that can be called the Courtois Toy Cipher (CTC). It is quite simple, and yet very much like any other known block ciph...
Nicolas Courtois