Sciweavers

23 search results - page 2 / 5
» On the Role of Key Schedules in Attacks on Iterated Ciphers
Sort
View
ICISC
2001
132views Cryptology» more  ICISC 2001»
13 years 8 months ago
Slide Attacks with a Known-Plaintext Cryptanalysis
Although many strong cryptanalytic tools exploit weaknesses in the data-randomizinig part of a block cipher, relatively few general tools for cryptanalyzing on the other part, the ...
Soichi Furuya
CANS
2008
Springer
198views Cryptology» more  CANS 2008»
13 years 9 months ago
3D: A Three-Dimensional Block Cipher
Abstract. The main contribution of this paper is a new iterated secretkey block cipher called 3D, inspired by the AES cipher. The 3D cipher has an SPN design, operates on 512-bit b...
Jorge Nakahara Jr.
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
12 years 10 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
FSE
1999
Springer
89views Cryptology» more  FSE 1999»
13 years 11 months ago
Slide Attacks
Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a high degree of self-similari...
Alex Biryukov, David Wagner
SACRYPT
1998
Springer
101views Cryptology» more  SACRYPT 1998»
13 years 11 months ago
On the Twofish Key Schedule
Twofish is a new block cipher with a 128 bit block, and a key length of 128, 192, or 256 bits, which has been submitted as an AES candidate. In this paper, we briefly review the st...
Bruce Schneier, John Kelsey, Doug Whiting, David W...