Sciweavers

506 search results - page 33 / 102
» The Block Cipher Square
Sort
View
FSE
1997
Springer
210views Cryptology» more  FSE 1997»
14 years 2 months ago
Partitioning Cryptanalysis
Matsui's linear cryptanalysis for iterated block ciphers is generalized to an attack called. This attack exploits a weakness that can be described by an e ective partition-pa...
Carlo Harpes, James L. Massey
AICCSA
2005
IEEE
91views Hardware» more  AICCSA 2005»
14 years 3 months ago
Secure transmission of sensitive data using multiple channels
A new scheme for transmitting sensitive data is proposed, the proposed scheme depends on partitioning the output of a block encryption module using the Chinese Remainder Theorem a...
Abdelhamid S. Abdelhamid, Ahmed A. Belal
IMA
2001
Springer
91views Cryptology» more  IMA 2001»
14 years 2 months ago
The Wide Trail Design Strategy
n, important for interoperability only. We can make abstraction from the representation of the elements of GF(28 ) and consider a block cipher that operates on strings of elements ...
Joan Daemen, Vincent Rijmen
FSE
1994
Springer
127views Cryptology» more  FSE 1994»
14 years 2 months ago
The RC5 Encryption Algorithm
This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of da...
Ronald L. Rivest
ASIACRYPT
1992
Springer
14 years 2 months ago
An Attack on Two Hash Functions by Zheng-Matsumoto-Imai
In [ZMI89,ZMI90] two constructions for a collision resistant hash function were proposed. The first scheme is based on a block cipher, and the second scheme uses modular arithmetic...
Bart Preneel, René Govaerts, Joos Vandewall...