Sciweavers

427 search results - page 34 / 86
» Cryptanalysis of the
Sort
View
AFRICACRYPT
2010
Springer
14 years 1 months ago
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of ...
Praveen Gauravaram, Gaëtan Leurent, Florian M...
FSE
2010
Springer
185views Cryptology» more  FSE 2010»
14 years 22 days ago
Cryptanalysis of the DECT Standard Cipher
Karsten Nohl, Erik Tews, Ralf-Philipp Weinmann
ACISP
2001
Springer
14 years 13 days ago
Improved Cryptanalysis of the Self-Shrinking Generator
Erik Zenner, Matthias Krause, Stefan Lucks
ASIACRYPT
2001
Springer
14 years 13 days ago
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001
Craig Gentry, Jakob Jonsson, Jacques Stern, Michae...
CCS
2001
ACM
14 years 13 days ago
A Cryptanalysis of the High-Bandwidth Digital Content Protection System
Abstract. We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCP is a proposed identity-based cryptosystem ...
Scott Crosby, Ian Goldberg, Robert Johnson, Dawn X...