Sciweavers

21 search results - page 3 / 5
» The Rainbow Attack on Stream Ciphers Based on Maiorana-McFar...
Sort
View
AES
2004
Springer
151views Cryptology» more  AES 2004»
14 years 26 days ago
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components
This paper is about the design of multivariate public key schemes, as well as block and stream ciphers, in relation to recent attacks that exploit various types of multivariate alg...
Nicolas Courtois
MYCRYPT
2005
Springer
187views Cryptology» more  MYCRYPT 2005»
14 years 29 days ago
Distinguishing Attacks on T-Functions
Klimov and Shamir proposed a new class of simple cryptographic primitives named T-functions. For two concrete proposals based on the squaring operation, a single word T-function an...
Simon Künzli 0002, Pascal Junod, Willi Meier
INDOCRYPT
2005
Springer
14 years 29 days ago
Attack the Dragon
1 Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedb...
Håkan Englund, Alexander Maximov
FSE
2003
Springer
99views Cryptology» more  FSE 2003»
14 years 21 days ago
Rabbit: A New High-Performance Stream Cipher
Abstract. We present a new stream cipher, Rabbit, based on iterating a set of coupled nonlinear functions. Rabbit is characterized by a high performance in software with a measured...
Martin Boesgaard, Mette Vesterager, Thomas Pederse...
CANS
2009
Springer
164views Cryptology» more  CANS 2009»
14 years 2 months ago
Extensions of the Cube Attack Based on Low Degree Annihilators
At Crypto 2008, Shamir introduced a new algebraic attack called the cube attack, which allows us to solve black-box polynomials if we are able to tweak the inputs by varying an ini...
Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei We...