Sciweavers

381 search results - page 35 / 77
» Tweakable Block Ciphers
Sort
View
FSE
2006
Springer
107views Cryptology» more  FSE 2006»
14 years 2 months ago
Some Plausible Constructions of Double-Block-Length Hash Functions
Abstract. In this article, it is discussed how to construct a compression function with 2n-bit output using a component function with n-bit output. The component function is either...
Shoichi Hirose
FSE
1997
Springer
210views Cryptology» more  FSE 1997»
14 years 3 months ago
Partitioning Cryptanalysis
Matsui's linear cryptanalysis for iterated block ciphers is generalized to an attack called. This attack exploits a weakness that can be described by an e ective partition-pa...
Carlo Harpes, James L. Massey
AICCSA
2005
IEEE
91views Hardware» more  AICCSA 2005»
14 years 4 months ago
Secure transmission of sensitive data using multiple channels
A new scheme for transmitting sensitive data is proposed, the proposed scheme depends on partitioning the output of a block encryption module using the Chinese Remainder Theorem a...
Abdelhamid S. Abdelhamid, Ahmed A. Belal
IMA
2001
Springer
91views Cryptology» more  IMA 2001»
14 years 3 months ago
The Wide Trail Design Strategy
n, important for interoperability only. We can make abstraction from the representation of the elements of GF(28 ) and consider a block cipher that operates on strings of elements ...
Joan Daemen, Vincent Rijmen
FSE
1994
Springer
127views Cryptology» more  FSE 1994»
14 years 2 months ago
The RC5 Encryption Algorithm
This document describes the RC5 encryption algorithm, a fast symmetric block cipher suitable for hardware or software implementations. A novel feature of RC5 is the heavy use of da...
Ronald L. Rivest