Sciweavers

101 search results - page 11 / 21
» Differential Cryptanalysis of Q
Sort
View
FSE
2008
Springer
193views Cryptology» more  FSE 2008»
13 years 9 months ago
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba
The stream cipher Salsa20 was introduced by Bernstein in 2005 as a candidate in the eSTREAM project, accompanied by the reduced versions Salsa20/8 and Salsa20/12. ChaCha is a varia...
Jean-Philippe Aumasson, Simon Fischer 0002, Shahra...
IPL
2010
141views more  IPL 2010»
13 years 2 months ago
On the differential and linear efficiency of balanced Feistel networks
Balanced Feistel networks (BFN) have been widely used for constructing efficient block ciphers. They are known to provide high efficiency with respect to differential and linear c...
Andrey Bogdanov
FOCS
2010
IEEE
13 years 5 months ago
Boosting and Differential Privacy
Boosting is a general method for improving the accuracy of learning algorithms. We use boosting to construct improved privacy-preserving synopses of an input database. These are da...
Cynthia Dwork, Guy N. Rothblum, Salil P. Vadhan
ISCAS
2007
IEEE
79views Hardware» more  ISCAS 2007»
14 years 1 months ago
Quadrature Mismatch Shaping Techniques for Fully Differential Circuits
— Quadrature Σ∆ ADCs require a feedback path for both the I and the Q part of the complex feedback signal. A complex DAC could give this feedback with near-perfect I/Q balance...
Stijn Reekmans, Pieter Rombouts, Ludo Weyten
FSE
1998
Springer
79views Cryptology» more  FSE 1998»
13 years 11 months ago
On the Design and Security of RC2
The block cipher RC2 was designed in 1989 by Ron Rivest for RSA Data Security Inc. In this paper we describe both the cipher and preliminary attempts to use both differential and l...
Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest,...