Sciweavers

427 search results - page 7 / 86
» Cryptanalysis of the
Sort
View
ICISC
2009
163views Cryptology» more  ICISC 2009»
13 years 5 months ago
Improved Linear Cryptanalysis of SOSEMANUK
The SOSEMANUK stream cipher is one of the finalists of the eSTREAM project. In this paper, we improve the linear cryptanalysis of SOSEMANUK presented in Asiacrypt 2008. We apply th...
Joo Yeon Cho, Miia Hermelin
CTRSA
2010
Springer
189views Cryptology» more  CTRSA 2010»
14 years 2 months ago
Linear Cryptanalysis of Reduced-Round PRESENT
Abstract. PRESENT is a hardware-oriented block cipher suitable for resource constrained environment. In this paper we analyze PRESENT by the multidimensional linear cryptanalysis m...
Joo Yeon Cho
IPL
2006
65views more  IPL 2006»
13 years 7 months ago
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme
We propose cryptanalysis of the First Domingo-Ferrer's algebraic privacy homomorphism E : Zn (Zp
Jung Hee Cheon, Woo-Hwan Kim, Hyun Soo Nam
IMA
2005
Springer
113views Cryptology» more  IMA 2005»
14 years 1 months ago
Exploiting Coding Theory for Collision Attacks on SHA-1
In this article we show that coding theory can be exploited efficiently for the cryptanalysis of hash functions. We will mainly focus
Norbert Pramstaller, Christian Rechberger, Vincent...
ASIACRYPT
2010
Springer
13 years 5 months ago
Rotational Rebound Attacks on Reduced Skein
Abstract. In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competitio...
Dmitry Khovratovich, Ivica Nikolic, Christian Rech...