Sciweavers

517 search results - page 7 / 104
» Bit Encryption Is Complete
Sort
View
AES
2000
Springer
136views Cryptology» more  AES 2000»
14 years 14 days ago
Preliminary Cryptanalysis of Reduced-Round Serpent
Serpent is a 32-round AES block cipher finalist. In this paper we present several attacks on reduced-round variants of Serpent that require less work than exhaustive search. We at...
Tadayoshi Kohno, John Kelsey, Bruce Schneier
CRYPTOLOGIA
2006
155views more  CRYPTOLOGIA 2006»
13 years 8 months ago
The Whirlpool Secure Hash Function
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less tha...
William Stallings
ACMSE
2004
ACM
14 years 1 months ago
Trust based adaptive on demand ad hoc routing protocol
In this paper, we propose a routing protocol that is based on securing the routing information from unauthorized users. Even though routing protocols of this category are already ...
Rajiv K. Nekkanti, Chung-wei Lee
SACRYPT
1998
Springer
14 years 9 days ago
A Timing Attack on RC5
Abstract. This paper describes a timing attack on the RC5 block encryption algorithm. The analysis is motivated by the possibility that some implementations of RC5 could result in ...
Helena Handschuh, Howard M. Heys