Sciweavers

506 search results - page 9 / 102
» The Block Cipher Square
Sort
View
FSE
2003
Springer
89views Cryptology» more  FSE 2003»
14 years 3 months ago
Rectangle Attacks on 49-Round SHACAL-1
SHACAL-1 is a 160-bit block cipher with variable key length
Eli Biham, Orr Dunkelman, Nathan Keller
CRYPTO
1994
Springer
128views Cryptology» more  CRYPTO 1994»
14 years 2 months ago
Linear Cryptanalysis Using Multiple Approximations
We present a technique which aids in the linear cryptanalysis of a block cipher and allows for a reduction in the amount of data required for a successful attack. We note the limit...
Burton S. Kaliski Jr., Matthew J. B. Robshaw
CCECE
2009
IEEE
14 years 4 months ago
An ultra compact block cipher for serialized architecture implementations
In this paper, we present a new block cipher, referred as PUFFIN2, that is designed to be used with applications requiring very low circuit area. PUFFIN2 is designed to be impleme...
Cheng Wang, Howard M. Heys
CHES
2009
Springer
229views Cryptology» more  CHES 2009»
14 years 10 months ago
KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers
Abstract. In this paper we propose a new family of very efficient hardware oriented block ciphers. The family contains six block ciphers divided into two flavors. All block ciphers...
Christophe De Cannière, Orr Dunkelman, Miro...
TIT
2011
126views more  TIT 2011»
13 years 5 months ago
The Return of the Cryptographic Boomerang
—The boomerang analysis, together with its offspring the amplified boomerang analysis and the rectangle analysis, are techniques that are widely used in the analysis of block ci...
Sean Murphy