Sciweavers

124 search results - page 6 / 25
» On the Construction of Variable-Input-Length Ciphers
Sort
View
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
13 years 12 months ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi
CTRSA
2007
Springer
153views Cryptology» more  CTRSA 2007»
13 years 11 months ago
Differential Power Analysis of Stream Ciphers
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream cipher...
Wieland Fischer, Berndt M. Gammel, O. Kniffler, J....
WISA
2009
Springer
14 years 1 months ago
Unknown Plaintext Template Attacks
In this paper we present a variation of the template attack classification process that can be applied to block ciphers when the plaintext and ciphertext used are unknown. In a na...
Neil Hanley, Michael Tunstall, William P. Marnane
GLOBECOM
2008
IEEE
14 years 1 months ago
Small Logarithmic S-Boxes for Small Ciphers
-- The substitution box (S-Box) is one of the most important components in modern ciphers. This paper reports a new class of S-Boxes defined by the logarithmic functions in GF(16)....
Xian Liu
CISC
2006
Springer
106views Cryptology» more  CISC 2006»
13 years 11 months ago
A General Construction of Tweakable Block Ciphers and Different Modes of Operations
This work builds on earlier work by Rogaway at Asiacrypt 2004 on tweakable block cipher (TBC) and modes of operations. Our first contribution is to generalize Rogaway's TBC co...
Debrup Chakraborty, Palash Sarkar