Sciweavers

124 search results - page 21 / 25
» On the Construction of Variable-Input-Length Ciphers
Sort
View
EUROCRYPT
2009
Springer
14 years 8 months ago
Cryptanalysis of MDC-2
We provide a collision attack and preimage attacks on the MDC-2 construction, which is a method (dating back to 1988) of turning an n-bit block cipher into a 2n-bit hash function. ...
Christian Rechberger, Florian Mendel, Lars R. Knud...
DCC
2007
IEEE
14 years 7 months ago
ID-based cryptography using symmetric primitives
A general method for deriving an identity-based public key cryptosystem from a one-way function is described. We construct both ID-based signature schemes and ID-based encryption ...
Chris J. Mitchell, Fred Piper, Peter R. Wild
ASIACRYPT
2004
Springer
14 years 22 days ago
How Far Can We Go Beyond Linear Cryptanalysis?
Abstract. Several generalizations of linear cryptanalysis have been proposed in the past, as well as very similar attacks in a statistical point of view. In this paper, we define ...
Thomas Baignères, Pascal Junod, Serge Vaude...
FSE
2003
Springer
123views Cryptology» more  FSE 2003»
14 years 17 days ago
The Security of "One-Block-to-Many" Modes of Operation
In this paper, we investigate the security, in the Luby-Rackoff security paradigm, of blockcipher modes of operation allowing to expand a one-block input into a longer t-block ou...
Henri Gilbert
DEXAW
2002
IEEE
117views Database» more  DEXAW 2002»
14 years 9 days ago
Tools for Personalised Annotation and Organisation of Diverse Web Resources
The CIPHER project is concerned with developing tools and methodologies to support the exploration of cultural heritage via web-based Cultural Heritage Forums. As part of the proj...
Annika Wolff, Zdenek Zdráhal, Zdenek Kouba