Sciweavers

50 search results - page 5 / 10
» Structural Cryptanalysis of SASAS
Sort
View
FSE
2003
Springer
228views Cryptology» more  FSE 2003»
14 years 1 months ago
Further Observations on the Structure of the AES Algorithm
We present our further observations on the structure of the AES algorithm relating to the cyclic properties of the functions used in this cipher. We note that the maximal period of...
Beomsik Song, Jennifer Seberry
CTRSA
2009
Springer
155views Cryptology» more  CTRSA 2009»
14 years 2 months ago
Cryptanalysis of CTC2
CTC is a toy cipher designed in order to assess the strength of algebraic attacks. While the structure of CTC is deliberately weak with respect to algebraic attacks, it was claimed...
Orr Dunkelman, Nathan Keller
CHES
2005
Springer
107views Cryptology» more  CHES 2005»
14 years 1 months ago
A New Baby-Step Giant-Step Algorithm and Some Applications to Cryptanalysis
We describe a new variant of the well known Baby-Step Giant-Step algorithm in the case of some discrete logarithms with a special structure. More precisely, we focus on discrete lo...
Jean-Sébastien Coron, David Lefranc, Guilla...
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
14 years 3 days ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares
CRYPTO
2008
Springer
163views Cryptology» more  CRYPTO 2008»
13 years 9 months ago
Cryptanalysis of the GOST Hash Function
In this article, we analyze the security of the GOST hash function. The GOST hash function, defined in the Russian standard GOST 34.11-94, is an iterated hash function producing a ...
Florian Mendel, Norbert Pramstaller, Christian Rec...