Sciweavers

28 search results - page 3 / 6
» fse 2008
Sort
View
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
13 years 10 months ago
A Meet-in-the-Middle Attack on 8-Round AES
We present a 5-round distinguisher for AES. We exploit this distinguisher to develop a meet-in-the-middle attack on 7 rounds of AES192 and 8 rounds of AES-256. We also give a time-...
Hüseyin Demirci, Ali Aydin Selçuk
ICASSP
2008
IEEE
14 years 3 months ago
Joint optimization of transceivers with fractionally spaced equalizers
Abstract— In this paper we propose a method for joint optimization of transceivers with fractionally spaced equalization (FSE). We use the effective single-input multiple-output ...
Ching-Chih Weng, P. P. Vaidyanathan
FSE
2008
Springer
141views Cryptology» more  FSE 2008»
13 years 10 months ago
Collisions for Step-Reduced SHA-256
In this article we find collisions for step-reduced SHA-256. We develop a differential that holds with high probability if the message satisfies certain conditions. We solve the eq...
Ivica Nikolic, Alex Biryukov
FSE
2008
Springer
110views Cryptology» more  FSE 2008»
13 years 10 months ago
How to Encrypt with a Malicious Random Number Generator
Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving an adversary access to an oracle that encrypts a given message m using random coins that ...
Seny Kamara, Jonathan Katz
FSE
2008
Springer
105views Cryptology» more  FSE 2008»
13 years 10 months ago
An Improved Security Bound for HCTR
HCTR was proposed by Wang, Feng and Wu in 2005. It is a mode of operation which provides a tweakable strong pseudorandom permutation. Though HCTR is quite an efficient mode, the au...
Debrup Chakraborty, Mridul Nandi