Sciweavers

583 search results - page 11 / 117
» On the Complexity of Matsui's Attack
Sort
View
FSE
2007
Springer
111views Cryptology» more  FSE 2007»
14 years 1 months ago
An Analysis of XSL Applied to BES
Abstract. Currently, the only plausible attack on the Advanced Encryption System (AES) is the XSL attack over F256 through the Big Encryption System (BES) embedding. In this paper,...
Chu-Wee Lim, Khoongming Khoo
ACSAC
2005
IEEE
14 years 28 days ago
A Host-Based Approach to Network Attack Chaining Analysis
The typical means by which an attacker breaks into a network is through a chain of exploits, where each exploit in the chain lays the groundwork for subsequent exploits. Such a ch...
Paul Ammann, Joseph Pamula, Julie A. Street, Ronal...
ASIACRYPT
2005
Springer
14 years 25 days ago
A Near-Practical Attack Against B Mode of HBB
Stream cipher Hiji-Bij-Bij (HBB) was proposed by Sarkar at Indocrypt’03. This cipher uses cellular automata (CA). The algorithm has two modes: a basic mode (B) and a self-synchro...
Joydip Mitra
FSE
1999
Springer
87views Cryptology» more  FSE 1999»
13 years 11 months ago
Attack on Six Rounds of Crypton
Abstract. In this paper we present an attack on a reduced round version of Crypton. The attack is based on the dedicated Square attack. We explain why the attack also works on Cryp...
Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart...
ASIACRYPT
2006
Springer
13 years 11 months ago
New Guess-and-Determine Attack on the Self-Shrinking Generator
We propose a new type of guess-and-determine attack on the self-shrinking generator (SSG). The inherent flexibility of the new attack enables us to deal with different attack condi...
Bin Zhang, Dengguo Feng