Sciweavers

541 search results - page 34 / 109
» A generic attack to ciphers
Sort
View
IMA
1997
Springer
106views Cryptology» more  IMA 1997»
14 years 6 days ago
Hash Functions and MAC Algorithms Based on Block Ciphers
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It discusses the main requirements for these cryptographic primitives, motivates these...
Bart Preneel
CORR
2008
Springer
133views Education» more  CORR 2008»
13 years 8 months ago
A New Stream Cipher: Dicing
: In this paper, we will propose a new synchronous stream cipher named DICING, which can be taken as a clock-controlled one but with a new mechanism of altering steps. With the sim...
An-Ping Li
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
14 years 8 days ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares
AICCSA
2005
IEEE
91views Hardware» more  AICCSA 2005»
14 years 1 months ago
Secure transmission of sensitive data using multiple channels
A new scheme for transmitting sensitive data is proposed, the proposed scheme depends on partitioning the output of a block encryption module using the Chinese Remainder Theorem a...
Abdelhamid S. Abdelhamid, Ahmed A. Belal
SACRYPT
2000
Springer
13 years 11 months ago
LILI Keystream Generator
The LILI-128 keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. The design offers large period and linear complexity, and is resistant to currently ...
Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, W...