Sciweavers

8 search results - page 1 / 2
» indocrypt 2009
Sort
View
INDOCRYPT
2009
Springer
14 years 2 months ago
Secure Parameters for SWIFFT
Johannes Buchmann, Richard Lindner
INDOCRYPT
2009
Springer
14 years 2 months ago
Second Preimage Attack on SHAMATA-512
We present a second preimage attack on SHAMATA-512, which is a hash function of 512bit output and one of the ļ¬rst round candidates of the SHA-3 competition. The attack uses diļ¬...
Kota Ideguchi, Dai Watanabe
INDOCRYPT
2009
Springer
14 years 2 months ago
Reusing Static Keys in Key Agreement Protocols
Abstract. Contrary to conventional cryptographic wisdom, the NIST SP 800-56A standard explicitly allows the use of a static key pair in more than one of the key establishment proto...
Sanjit Chatterjee, Alfred Menezes, Berkant Ustaogl...
INDOCRYPT
2009
Springer
14 years 2 months ago
Two Attacks against the Ff RFID Protocol
This paper investigates a new family of RFID protocols called Ff that grew out of a proposal made at ESORICS 2007. This family has the property of having highly eļ¬ƒcient implement...
Olivier Billet, Kaoutar Elkhiyaoui
INDOCRYPT
2009
Springer
14 years 2 months ago
FSBday
This paper applies generalized birthday attacks to the FSB compression function, and shows how to adapt the attacks so that they run in far less memory. In particular, this paper p...
Daniel J. Bernstein, Tanja Lange, Ruben Niederhage...