Sciweavers

378 search results - page 30 / 76
» A Traceable Block Cipher
Sort
View
94
Voted
IJNSEC
2007
83views more  IJNSEC 2007»
15 years 2 months ago
Security Analysis of Double Length Compression Function Based on Block Cipher
Pin Lin, Wenling Wu, Chuankun Wu
82
Voted
JCSS
2000
54views more  JCSS 2000»
15 years 2 months ago
The Security of the Cipher Block Chaining Message Authentication Code
Mihir Bellare, Joe Kilian, Phillip Rogaway
65
Voted
JISE
2000
43views more  JISE 2000»
15 years 2 months ago
The Block Cipher: SEA2 With Provable Resistance Against DC and LC Attacks
Shih-Hsu Chang, Fang-Hsuan Cheng, Wen-Hsing Hsu
129
Voted
IACR
2011
151views more  IACR 2011»
14 years 2 months ago
Cryptanalysis with Ternary Difference: Applied to Block Cipher PRESENT
: Signed difference approach was first introduced by Wang for finding collision in MD5. In this paper we introduce ternary difference approach and present it in 3 symbols. To show ...
Farzaneh Abazari, Babak Sadeghian