Sciweavers

32 search results - page 5 / 7
» Security Weaknesses in a Randomized Stream Cipher
Sort
View
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
13 years 11 months ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares
PKC
2004
Springer
106views Cryptology» more  PKC 2004»
14 years 1 days ago
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
In a practical system, a message is often encrypted more than once by different encryptions, here called multiple encryption, to enhance its security. Additionally, new features ...
Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, H...
SP
2009
IEEE
130views Security Privacy» more  SP 2009»
14 years 1 months ago
Wirelessly Pickpocketing a Mifare Classic Card
The Mifare Classic is the most widely used contactless smartcard on the market. The stream cipher CRYPTO1 used by the Classic has recently been reverse engineered and serious atta...
Flavio D. Garcia, Peter van Rossum, Roel Verdult, ...
ACISP
2003
Springer
13 years 12 months ago
New Constructions for Resilient and Highly Nonlinear Boolean Functions
Abstract. We explore three applications of geometric sequences in constructing cryptographic Boolean functions. First, we construct 1-resilient functions of n Boolean variables wit...
Khoongming Khoo, Guang Gong
FSE
2005
Springer
116views Cryptology» more  FSE 2005»
14 years 7 days ago
Narrow T-Functions
T-functions were introduced by Klimov and Shamir in a series of papers during the last few years. They are of great interest for cryptography as they may provide some new building ...
Magnus Daum