Sciweavers

427 search results - page 68 / 86
» Cryptanalysis of the
Sort
View
FSE
2006
Springer
104views Cryptology» more  FSE 2006»
13 years 11 months ago
Chosen-Ciphertext Attacks Against MOSQUITO
Self-Synchronizing Stream Ciphers (SSSC) are a particular class of symmetric encryption algorithms, such that the resynchronization is automatic, in case of error during the transm...
Antoine Joux, Frédéric Muller
ASIACRYPT
2008
Springer
13 years 10 months ago
Slide Attacks on a Class of Hash Functions
This paper studies the application of slide attacks to hash functions. Slide attacks have mostly been used for block cipher cryptanalysis. But, as shown in the current paper, they ...
Michael Gorski, Stefan Lucks, Thomas Peyrin
CORR
2010
Springer
61views Education» more  CORR 2010»
13 years 8 months ago
An Improved DC Recovery Method from AC Coefficients of DCT-Transformed Images
Motivated by the work of Uehara et al. [1], an improved method to recover DC coefficients from AC coefficients of DCT-transformed images is investigated in this work, which finds ...
Shujun Li, Junaid Jameel Ahmad, Dietmar Saupe, C.-...
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 8 months ago
Doubly Perfect Nonlinear Boolean Permutations
Due to implementation constraints the XOR operation is widely used in order to combine plaintext and key bit-strings in secretkey block ciphers. This choice directly induces the cl...
Laurent Poinsot
CORR
2010
Springer
142views Education» more  CORR 2010»
13 years 8 months ago
A Fault Analytic Method against HB+
The search for lightweight authentication protocols suitable for low-cost RFID tags constitutes an active and challenging research area. In this context, a family of protocols base...
Jose Carrijo, Rafael Tonicelli, Anderson C. A. Nas...