Sciweavers

427 search results - page 45 / 86
» Cryptanalysis of the
Sort
View
ASIACRYPT
1991
Springer
13 years 11 months ago
Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI
Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jenn...
FSE
2009
Springer
148views Cryptology» more  FSE 2009»
13 years 11 months ago
Cryptanalysis of the LAKE Hash Family
We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitiv...
Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitr...
CRYPTO
2008
Springer
163views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Cryptanalysis of the GOST Hash Function
In this article, we analyze the security of the GOST hash function. The GOST hash function, defined in the Russian standard GOST 34.11-94, is an iterated hash function producing a ...
Florian Mendel, Norbert Pramstaller, Christian Rec...
CTRSA
2008
Springer
118views Cryptology» more  CTRSA 2008»
13 years 9 months ago
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes
Pierre-Alain Fouque, Gaëtan Leurent
EUC
2008
Springer
13 years 9 months ago
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
Abstract. Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously. Recently in May 2008, a scheme for identity based thre...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...