Sciweavers

541 search results - page 63 / 109
» A generic attack to ciphers
Sort
View
CRYPTOLOGIA
2007
53views more  CRYPTOLOGIA 2007»
13 years 8 months ago
Rejewski's Catalog
When attacking the German Enigma cipher machine during the 1930s, the Polish mathematician Marian Rejewski developed a catalog of disjoint cycles of permutations generated by Enigm...
Alex Kuhl
FSE
1998
Springer
131views Cryptology» more  FSE 1998»
14 years 6 days ago
Cryptanalysis of TWOPRIME
Ding et al [DNRS97] propose a stream generator based on several layers. We present several attacks. First, we observe that the non-surjectivity of a linear combination step allows ...
Don Coppersmith, David Wagner, Bruce Schneier, Joh...
NETWORKING
2007
13 years 9 months ago
Privacy-Aware Multi-Context RFID Infrastructure Using Public Key Cryptography
We propose a novel approach in designing an RFID infrastructure which foresees the usage of a single RFID tag within different contexts and for multiple purposes. We regard privacy...
Selim Volkan Kaya, Erkay Savas, Albert Levi, Ö...
IPL
2010
180views more  IPL 2010»
13 years 5 months ago
The effects of the omission of last round's MixColumns on AES
The Advanced Encryption Standard (AES) is the most widely deployed block cipher. It follows the modern iterated block cipher approach, iterating a simple round function multiple ti...
Orr Dunkelman, Nathan Keller
IACR
2011
127views more  IACR 2011»
12 years 7 months ago
Cryptanalysis of KeeLoq code-hopping using a Single FPGA
The KeeLoq cipher is used in many wireless car door systems and garage openers. Recently the algorithm was studied and several attacks have been published. When a random seed is no...
Idan Sheetrit, Avishai Wool