Sciweavers

72 search results - page 5 / 15
» Practical Cryptanalysis of SFLASH
Sort
View
PKC
2011
Springer
169views Cryptology» more  PKC 2011»
12 years 11 months ago
Cryptanalysis of the RSA Subgroup Assumption from TCC 2005
At TCC 2005, Groth underlined the usefulness of working in small RSA subgroups of hidden order. In assessing the security of the relevant hard problems, however, the best attack co...
Jean-Sébastien Coron, Antoine Joux, Avradip...
FSE
2006
Springer
114views Cryptology» more  FSE 2006»
14 years 6 days ago
Cryptanalysis of the Full HAVAL with 4 and 5 Passes
Abstract. HAVAL is a cryptographic hash function with variable digest size proposed by Zheng, Pieprzyk and Seberry in 1992. It has three variants, 3-, 4-, and 5-pass HAVAL. Previou...
Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park
FSE
2011
Springer
268views Cryptology» more  FSE 2011»
13 years 1 days ago
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
At Eurocrypt 2001, Biryukov and Shamir investigated the security of AES-like ciphers where the substitutions and affine transformations are all key-dependent and successfully crypt...
Julia Borghoff, Lars R. Knudsen, Gregor Leander, S...
CRYPTO
2003
Springer
127views Cryptology» more  CRYPTO 2003»
14 years 1 months ago
Cryptanalysis of SAFER++
This paper presents several multiset and boomerang attacks on Safer++ up to 5.5 out of its 7 rounds. These are the best known attacks for this cipher and significantly improve the...
Alex Biryukov, Christophe De Cannière, Gust...
FSE
2000
Springer
80views Cryptology» more  FSE 2000»
14 years 4 days ago
Stochastic Cryptanalysis of Crypton
Abstract. Crypton is a 12-round blockcipher proposed as an AES candidate by C.H. Lim in 1998. In this paper, we show how to exploit some statistical deficiencies of the Crypton rou...
Marine Minier, Henri Gilbert