Sciweavers

26 search results - page 3 / 6
» africacrypt 2008
Sort
View
114
Voted
AFRICACRYPT
2008
Springer
15 years 9 months ago
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
Simon Fischer 0002, Shahram Khazaei, Willi Meier
142
Voted
AFRICACRYPT
2008
Springer
15 years 5 months ago
Differential Cryptanalysis of Reduced-Round PRESENT
: In this paper, we have presented flaws in differential cryptanalysis of reduced round variant of PRESENT given by M.Wang in [3] [4] for 80 bits key length and we have shown that ...
Meiqin Wang
AFRICACRYPT
2008
Springer
15 years 9 months ago
A Brief History of Provably-Secure Public-Key Encryption
Public-key encryption schemes are a useful and interesting field of cryptographic study. The ultimate goal for the cryptographer in the field of public-key encryption would be th...
Alexander W. Dent
121
Voted
AFRICACRYPT
2008
Springer
15 years 5 months ago
An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol Based on Merkle Trees
Proof-of-work schemes are economic measures to deter denial-of-service attacks: service requesters compute moderately hard functions the results of which are easy to check by the ...
Fabien Coelho
133
Voted
AFRICACRYPT
2009
Springer
15 years 10 months ago
Cryptanalysis of Vortex
Vortex is a hash function that was first presented at ISC’2008, then submitted to the NIST SHA-3 competition after some modifications. This paper describes several attacks on b...
Jean-Philippe Aumasson, Orr Dunkelman, Florian Men...