Sciweavers

176 search results - page 8 / 36
» Distinguishing Attacks on T-Functions
Sort
View
JOC
2008
92views more  JOC 2008»
13 years 7 months ago
Cryptanalysis of an E0-like Combiner with Memory
In this paper, we study an E0-like combiner with memory as the keystream generator. First, we formulate a systematic and simple method to compute correlations of the FSM output seq...
Yi Lu 0002, Serge Vaudenay
INDOCRYPT
2005
Springer
14 years 1 months ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov
AFRICACRYPT
2008
Springer
14 years 2 months ago
Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds
Rijndael is a block cipher designed by V. Rijmen and J. Daemen and it was chosen in its 128-bit block version as AES by the NIST in October 2000. Three key lengths - 128, 192 or 25...
Samuel Galice, Marine Minier
ICMCS
2007
IEEE
203views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Attacking Some Perceptual Image Hash Algorithms
Perceptual hashing is an emerging solution for multimedia content authentication. Due to their robustness, such techniques might not work well when malicious attack is perceptuall...
Li Weng, Bart Preneel
IACR
2011
106views more  IACR 2011»
12 years 7 months ago
Unaligned Rebound Attack - Application to Keccak
We analyze the internal permutations of Keccak, one of the NIST SHA-3 competition finalists, in regard to differential properties. By carefully studying the elements composing th...
Alexandre Duc, Jian Guo 0001, Thomas Peyrin, Lei W...