Sciweavers

83 search results - page 10 / 17
» Improved Cryptanalysis of Skein
Sort
View
IACR
2011
243views more  IACR 2011»
12 years 7 months ago
Guess-then-Meet-in-the-Middle Attacks on the KTANTAN Family of Block Ciphers
The block cipher family for lightweight devices, KTANTAN, is analyzed in this paper. We propose a new cryptanalysis method which improves results of Meet-in-the-Middle attacks on K...
Bo Zhu, Guang Gong
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
14 years 27 days ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
FSE
2007
Springer
192views Cryptology» more  FSE 2007»
14 years 1 months ago
Algebraic Cryptanalysis of 58-Round SHA-1
In 2004, a new attack against SHA-1 has been proposed by a team leaded by Wang [15]. The aim of this article5 is to sophisticate and improve Wang’s attack by using algebraic tech...
Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hi...
INDOCRYPT
2010
Springer
13 years 5 months ago
Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions
Abstract. Consider the RSA public key cryptosystem with the parameters N = pq, q < p < 2q, public encryption exponent e and private decryption exponent d. In this paper, cryp...
Santanu Sarkar, Sourav Sengupta, Subhamoy Maitra
CRYPTO
2003
Springer
127views Cryptology» more  CRYPTO 2003»
14 years 22 days ago
Cryptanalysis of SAFER++
This paper presents several multiset and boomerang attacks on Safer++ up to 5.5 out of its 7 rounds. These are the best known attacks for this cipher and significantly improve the...
Alex Biryukov, Christophe De Cannière, Gust...