Sciweavers

134 search results - page 7 / 27
» Attack for Flash MIX
Sort
View
AES
2000
Springer
136views Cryptology» more  AES 2000»
14 years 28 days ago
MARS Attacks! Preliminary Cryptanalysis of Reduced-Round MARS Variants
Abstract. In this paper, we discuss ways to attack various reducedround variants of MARS. We consider cryptanalysis of two reducedround variants of MARS: MARS with the full mixing ...
John Kelsey, Bruce Schneier
FC
2004
Springer
80views Cryptology» more  FC 2004»
14 years 1 months ago
Practical Anonymity for the Masses with MorphMix
MorphMix is a peer-to-peer circuit-based mix network to provide practical anonymous low-latency Internet access for millions of users. The basic ideas of MorphMix have been publish...
Marc Rennhard, Bernhard Plattner
CCS
2009
ACM
14 years 17 days ago
The bayesian traffic analysis of mix networks
This work casts the traffic analysis of anonymity systems, and in particular mix networks, in the context of Bayesian inference. A generative probabilistic model of mix network ar...
Carmela Troncoso, George Danezis
FC
2006
Springer
119views Cryptology» more  FC 2006»
14 years 7 days ago
Auditable Privacy: On Tamper-Evident Mix Networks
Abstract. We introduce the notion of tamper-evidence for mix networks in order to defend against attacks aimed at covertly leaking secret information held by corrupted mix servers....
Jong Youl Choi, Philippe Golle, Markus Jakobsson
IPL
2010
180views more  IPL 2010»
13 years 5 months ago
The effects of the omission of last round's MixColumns on AES
The Advanced Encryption Standard (AES) is the most widely deployed block cipher. It follows the modern iterated block cipher approach, iterating a simple round function multiple ti...
Orr Dunkelman, Nathan Keller