Sciweavers

427 search results - page 26 / 86
» Cryptanalysis of the
Sort
View
AFRICACRYPT
2009
Springer
14 years 2 months ago
Cryptanalysis of Vortex
Vortex is a hash function that was first presented at ISC’2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on b...
Jean-Philippe Aumasson, Orr Dunkelman, Florian Men...
ACNS
2009
Springer
193views Cryptology» more  ACNS 2009»
14 years 2 months ago
Cryptanalysis of Twister
In this paper, we present a pseudo-collision attack on the compression function of all Twister variants (224,256,384,512) with complexity of about 226.5 compression function evalua...
Florian Mendel, Christian Rechberger, Martin Schl&...
ASIACRYPT
2009
Springer
14 years 2 months ago
Improved Cryptanalysis of Skein
The hash function Skein is the submission of Ferguson et al. to the NIST Hash Competition, and is arguably a serious candidate for selection as SHA-3. This paper presents the firs...
Jean-Philippe Aumasson, Çagdas Çalik...
CANS
2009
Springer
150views Cryptology» more  CANS 2009»
14 years 2 months ago
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT
Jorge Nakahara, Pouyan Sepehrdad, Bingsheng Zhang,...