Sciweavers

506 search results - page 77 / 102
» The Block Cipher Square
Sort
View
IACR
2011
88views more  IACR 2011»
12 years 9 months ago
GCM, GHASH and Weak Keys
The Galois/Counter Mode (GCM) of operation has been standardized by NIST to provide single-pass authenticated encryption. The GHASH authentication component of GCM belongs to a cla...
Markku-Juhani O. Saarinen
EUROCRYPT
2009
Springer
14 years 10 months ago
Cube Attacks on Tweakable Black Box Polynomials
Almost any cryptographic scheme can be described by tweakable polynomials over GF(2), which contain both secret variables (e.g., key bits) and public variables (e.g., plaintext bit...
Itai Dinur, Adi Shamir
ACISP
2004
Springer
14 years 3 months ago
Theoretical Analysis of XL over Small Fields
Abstract. XL was first introduced to solve determined or overdetermined systems of equations over a finite field as an “algebraic attack” against multivariate cryptosystems....
Bo-Yin Yang, Jiun-Ming Chen
ICC
2007
IEEE
121views Communications» more  ICC 2007»
14 years 4 months ago
Low Complexity Adaptive Turbo Frequency-Domain Channel Estimation for Single-Carrier Multi-User Detection with Unknown Co-Channe
—Adaptive Turbo frequency-domain channel estimation is investigated for single-carrier (SC) multi-user detection in the presence of unknown co-channel interference (CCI). We prop...
Ye Wu, Xu Zhu, Asoke K. Nandi
IACR
2011
131views more  IACR 2011»
12 years 9 months ago
Direct Exponent and Scalar Multiplication Classes of an MDS Matrix
An MDS matrix is an important building block adopted by different algorithms that provides diffusion and therefore, has been an area of active research. In this paper, we present a...
Ghulam Murtaza, N. Ikram