Sciweavers

69 search results - page 8 / 14
» Attacking Reduced Round SHA-256
Sort
View
AFRICACRYPT
2008
Springer
13 years 9 months ago
Differential Cryptanalysis of Reduced-Round PRESENT
: In this paper, we have presented flaws in differential cryptanalysis of reduced round variant of PRESENT given by M.Wang in [3] [4] for 80 bits key length and we have shown that ...
Meiqin Wang
CANS
2011
Springer
254views Cryptology» more  CANS 2011»
12 years 7 months ago
Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48
Abstract. In this paper we analyze the recently proposed light-weight block cipher PRINTCipher. Applying algebraic methods and SAT-solving we are able to break 8 rounds of PRINTCip...
Stanislav Bulygin, Johannes Buchmann
FSE
2011
Springer
218views Cryptology» more  FSE 2011»
12 years 11 months ago
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
In this paper, we present new results on the second-round SHA-3 candidate ECHO. We describe a method to construct a collision in the compression function of ECHO-256 reduced to fou...
Jérémy Jean, Pierre-Alain Fouque
FSE
1999
Springer
87views Cryptology» more  FSE 1999»
13 years 11 months ago
Attack on Six Rounds of Crypton
Abstract. In this paper we present an attack on a reduced round version of Crypton. The attack is based on the dedicated Square attack. We explain why the attack also works on Cryp...
Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart...
CARDIS
1998
Springer
110views Hardware» more  CARDIS 1998»
13 years 11 months ago
Reducing the Collision Probability of Alleged Comp128
Wagner, Goldberg and Briceno have recently published an attack [2] on what they believe to be Comp128, the GSM A3A8 authentication hash function [1]. Provided that the attacker has...
Helena Handschuh, Pascal Paillier