Sciweavers

378 search results - page 9 / 76
» A Traceable Block Cipher
Sort
View
TIT
2011
126views more  TIT 2011»
13 years 4 months ago
The Return of the Cryptographic Boomerang
—The boomerang analysis, together with its offspring the amplified boomerang analysis and the rectangle analysis, are techniques that are widely used in the analysis of block ci...
Sean Murphy
CRYPTO
2000
Springer
89views Cryptology» more  CRYPTO 2000»
14 years 2 months ago
On the Round Security of Symmetric-Key Cryptographic Primitives
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of...
Zulfikar Ramzan, Leonid Reyzin
DAGSTUHL
2007
13 years 11 months ago
How Fast can be Algebraic Attacks on Block Ciphers?
In this paper we give a specification of a new block cipher that can be called the Courtois Toy Cipher (CTC). It is quite simple, and yet very much like any other known block ciph...
Nicolas Courtois
CTRSA
2003
Springer
96views Cryptology» more  CTRSA 2003»
14 years 3 months ago
Hardware Performance Characterization of Block Cipher Structures
In this paper, we present a general framework for evaluating the performance characteristics of block cipher structures composed of S-boxes and Maximum Distance Separable (MDS) ma...
Lu Xiao, Howard M. Heys
FSE
2007
Springer
112views Cryptology» more  FSE 2007»
14 years 4 months ago
Perfect Block Ciphers with Small Blocks
Louis Granboulan, Thomas Pornin