Sciweavers

72 search results - page 11 / 15
» Practical Cryptanalysis of SFLASH
Sort
View
CRYPTO
2007
Springer
144views Cryptology» more  CRYPTO 2007»
14 years 2 months ago
Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach
Coppersmith described at Eurocrypt 96 an algorithm for finding small roots of bivariate integer polynomial equations, based on lattice reduction. A simpler algorithm was later pro...
Jean-Sébastien Coron
INDOCRYPT
2005
Springer
14 years 2 months ago
Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem
This paper revisits a public key cryptosystem which is based on finite string-rewriting systems. We consider a new approach for cryptanalysis of such proposals—the so-called com...
Heiko Stamer
SACRYPT
2004
Springer
122views Cryptology» more  SACRYPT 2004»
14 years 1 months ago
Extending the Resynchronization Attack
Abstract. Synchronous stream ciphers need perfect synchronization between sender and receiver. In practice, this is ensured by a resync mechanism. Daemen et al. [10] first describ...
Frederik Armknecht, Joseph Lano, Bart Preneel
AC
1997
Springer
14 years 22 days ago
Cryptographic Primitives for Information Authentication - State of the Art
This paper describes the state of the art for cryptographic primitives that are used for protecting the authenticity of information: cryptographic hash functions and digital signat...
Bart Preneel
ASIACRYPT
1991
Springer
14 years 3 days ago
Limitations of the Even-Mansour Construction
In [1] a construction of a block cipher from a single pseudorandom permutation is proposed. In a complexity theoretical setting they prove that this scheme is secure against a pol...
Joan Daemen