Sciweavers

5 search results - page 1 / 1
» Rotational Cryptanalysis of ARX
Sort
View
FSE
2010
Springer
153views Cryptology» more  FSE 2010»
14 years 3 months ago
Rotational Cryptanalysis of ARX
In this paper we analyze the security of systems based on modular additions, rotations, and XORs (ARX systems). We provide both theoretical support for their security and practical...
Dmitry Khovratovich, Ivica Nikolic
ASIACRYPT
2010
Springer
13 years 9 months ago
Rotational Rebound Attacks on Reduced Skein
Abstract. In this paper we combine a recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competitio...
Dmitry Khovratovich, Ivica Nikolic, Christian Rech...
FSE
1999
Springer
101views Cryptology» more  FSE 1999»
14 years 3 months ago
Mod n Cryptanalysis, with Applications Against RC5P and M6
We introduce “mod n cryptanalysis,” a form of partitioning attack that is effective against ciphers which rely on modular addition and bit rotations for their security. We dem...
John Kelsey, Bruce Schneier, David Wagner
CANS
2010
Springer
197views Cryptology» more  CANS 2010»
13 years 9 months ago
Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE
The SHA-3 competition organized by NIST [1] aims to find a new hash standard as a replacement of SHA-2. Till now, 14 submissions have been selected as the second round candidates, ...
Bozhan Su, Wenling Wu, Shuang Wu, Le Dong
SACRYPT
2009
Springer
141views Cryptology» more  SACRYPT 2009»
14 years 5 months ago
Cryptanalysis of Dynamic SHA(2)
In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash fun...
Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan ...