Sciweavers

506 search results - page 62 / 102
» The Block Cipher Square
Sort
View
125
Voted
SACRYPT
2009
Springer
141views Cryptology» more  SACRYPT 2009»
15 years 9 months ago
Cryptanalysis of Dynamic SHA(2)
In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash fun...
Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan ...
93
Voted
CRYPTO
2004
Springer
86views Cryptology» more  CRYPTO 2004»
15 years 8 months ago
On Multiple Linear Approximations
In this paper we study the long standing problem of information extraction from multiple linear approximations. We develop a formal statistical framework for block cipher attacks b...
Alex Biryukov, Christophe De Cannière, Mich...
205
Voted
ASIACRYPT
1999
Springer
15 years 7 months ago
Equivalent Keys of HPC
This paper presents a weakness in the key schedule of the AES candidate HPC (Hasty Pudding Cipher). It is shown that for the HPC version with a 128-bit key, 1 in 256 keys is weak i...
Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincen...
121
Voted
IACR
2011
209views more  IACR 2011»
14 years 2 months ago
Improved Attacks on Full GOST
GOST is a well known block cipher which was developed in the Soviet Union during the 1970’s as an alternative to the US-developed DES. In spite of considerable cryptanalytic eff...
Itai Dinur, Orr Dunkelman, Adi Shamir
111
Voted
INFORMATICALT
2010
112views more  INFORMATICALT 2010»
15 years 17 hour ago
Recursive Identification of Systems with Noninvertible Output Nonlinearities
Abstract. The paper deals with the recursive identification of dynamic systems having noninvertible output characteristics, which can be represented by the Wiener model. A special ...
Jozef Vörös