Sciweavers

506 search results - page 53 / 102
» The Block Cipher Square
Sort
View
TIT
2008
130views more  TIT 2008»
13 years 9 months ago
Improving the Lower Bound on the Higher Order Nonlinearity of Boolean Functions With Prescribed Algebraic Immunity
Abstract. The recent algebraic attacks have received a lot of attention in cryptographic literature. The algebraic immunity of a Boolean function quantifies its resistance to the s...
Sihem Mesnager
JOC
2000
130views more  JOC 2000»
13 years 9 months ago
A Detailed Analysis of SAFER K
In this paper we analyze the block cipher SAFER K. First, we show a weakness in the key schedule, that has the effect that for almost every key there exists on the average three an...
Lars R. Knudsen
CRYPTO
2011
Springer
280views Cryptology» more  CRYPTO 2011»
12 years 9 months ago
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
At CHES 2010, the new block cipher PRINTcipher was presented as a light-weight encryption solution for printable circuits [15]. The best attack to date is a differential attack [1...
Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda Al...
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
14 years 2 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
CORR
2011
Springer
175views Education» more  CORR 2011»
13 years 5 months ago
The Dispersion of Lossy Source Coding
In this work we investigate the behavior of the minimal rate needed in order to guarantee a given probability that the distortion exceeds a prescribed threshold, at some fixed ...
Amir Ingber, Yuval Kochman