Sciweavers

69 search results - page 5 / 14
» Attacking Reduced Round SHA-256
Sort
View
CTRSA
2010
Springer
189views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Linear Cryptanalysis of Reduced-Round PRESENT
Abstract. PRESENT is a hardware-oriented block cipher suitable for resource constrained environment. In this paper we analyze PRESENT by the multidimensional linear cryptanalysis m...
Joo Yeon Cho
FSE
2010
Springer
132views Cryptology» more  FSE 2010»
14 years 8 days ago
Rebound Attack on Reduced-Round Versions of JH
Abstract. JH, designed by Wu, is one of the 14 second round candidates in the NIST Hash Competition. This paper presents the first analysis results of JH by using rebound attack. ...
Vincent Rijmen, Deniz Toz, Kerem Varici
FSE
2005
Springer
98views Cryptology» more  FSE 2005»
14 years 1 months ago
New Attacks Against Reduced-Round Versions of IDEA
In this paper, we describe a sequence of simple, yet efficient chosen-plaintext (or chosen-ciphertext) attacks against reduced-round versions of IDEA (with 2, 2.5, 3, 3.5, and 4 ro...
Pascal Junod
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
14 years 8 months ago
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
Jean-Philippe Aumasson, Itai Dinur, Willi Meier, A...