Sciweavers

427 search results - page 26 / 86
» Cryptanalysis of the
Sort
View
AFRICACRYPT
2009
Springer
15 years 10 months ago
Cryptanalysis of RSA Using the Ratio of the Primes
Abderrahmane Nitaj
AFRICACRYPT
2009
Springer
15 years 10 months ago
Cryptanalysis of Vortex
Vortex is a hash function that was first presented at ISC’2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on b...
Jean-Philippe Aumasson, Orr Dunkelman, Florian Men...
ACNS
2009
Springer
193views Cryptology» more  ACNS 2009»
15 years 10 months ago
Cryptanalysis of Twister
In this paper, we present a pseudo-collision attack on the compression function of all Twister variants (224,256,384,512) with complexity of about 226.5 compression function evalua...
Florian Mendel, Christian Rechberger, Martin Schl&...
122
Voted
ASIACRYPT
2009
Springer
15 years 10 months ago
Improved Cryptanalysis of Skein
The hash function Skein is the submission of Ferguson et al. to the NIST Hash Competition, and is arguably a serious candidate for selection as SHA-3. This paper presents the firs...
Jean-Philippe Aumasson, Çagdas Çalik...
104
Voted
CANS
2009
Springer
150views Cryptology» more  CANS 2009»
15 years 10 months ago
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
Jorge Nakahara, Pouyan Sepehrdad, Bingsheng Zhang,...