Sciweavers

378 search results - page 16 / 76
» A Traceable Block Cipher
Sort
View
CTRSA
2009
Springer
235views Cryptology» more  CTRSA 2009»
14 years 3 months ago
A Statistical Saturation Attack against the Block Cipher PRESENT
In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against block ciphers. As the name suggests, the attack is st...
Baudoin Collard, François-Xavier Standaert
FSE
2005
Springer
106views Cryptology» more  FSE 2005»
14 years 2 months ago
New Applications of T-Functions in Block Ciphers and Hash Functions
A T-function is a mapping from n-bit words to n-bit words in which for each 0 ≤ i < n, bit i of any output word can depend only on bits 0, 1, . . . , i of any input word. All ...
Alexander Klimov, Adi Shamir
CISC
2009
Springer
174views Cryptology» more  CISC 2009»
13 years 6 months ago
Algebraic Side-Channel Attacks
Abstract. In 2002, algebraic attacks using overdefined systems of equations have been proposed as a potentially very powerful cryptanalysis technique against block ciphers. However...
Mathieu Renauld, François-Xavier Standaert
FSE
2009
Springer
472views Cryptology» more  FSE 2009»
14 years 9 months ago
Algebraic Techniques in Differential Cryptanalysis
In this paper we propose a new cryptanalytic method against block ciphers, which combines both algebraic and statistical techniques. More specifically, we show how to use algebraic...
Martin Albrecht, Carlos Cid
ACISP
2003
Springer
14 years 2 months ago
On the Pseudorandomness of KASUMI Type Permutations
KASUMI is a block cipher which has been adopted as a standard of 3GPP. In this paper, we study the pseudorandomness of idealized KASUMI type permutations for adaptive adversaries. ...
Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa