Sciweavers

11 search results - page 2 / 3
» sacrypt 2001
Sort
View
SACRYPT
2001
Springer
14 years 29 days ago
A Simple Algebraic Representation of Rijndael
We show that there is a very straightforward closed algebraic formula for the Rijndael block cipher. This formula is highly structured and far simpler then algebraic formulations o...
Niels Ferguson, Richard Schroeppel, Doug Whiting
SACRYPT
2001
Springer
130views Cryptology» more  SACRYPT 2001»
14 years 29 days ago
On the Complexity of Matsui's Attack
Linear cryptanalysis remains the most powerful attack against DES at this time. Given 243 known plaintext-ciphertext pairs, Matsui expected a complexity of less than 243 DES evalua...
Pascal Junod
SACRYPT
2001
Springer
126views Cryptology» more  SACRYPT 2001»
14 years 29 days ago
Analysis of the E0 Encryption System
The encryption system E0, which is the encryption system used in the Bluetooth specification, is examined. In the current paper, a method of deriving the cipher key from a set of ...
Scott R. Fluhrer, Stefan Lucks
SACRYPT
2001
Springer
106views Cryptology» more  SACRYPT 2001»
14 years 29 days ago
Fast Normal Basis Multiplication Using General Purpose Processors
—For cryptographic applications, normal bases have received considerable attention, especially for hardware implementation. In this article, we consider fast software algorithms ...
Arash Reyhani-Masoleh, M. Anwarul Hasan
SACRYPT
2001
Springer
136views Cryptology» more  SACRYPT 2001»
14 years 29 days ago
New (Two-Track-)MAC Based on the Two Trails of RIPEMD
We present a new message authentication code. It is based on a two trail construction, which underlies the unkeyed hash function RIPEMD-160. It is in comparison with the MDx-MAC ba...
Bert den Boer, Bart Van Rompay, Bart Preneel, Joos...