Sciweavers

IMA
1999
Springer
79views Cryptology» more  IMA 1999»
14 years 26 days ago
Enhanced Image Coding for Noisy Channels
Paul Chippendale, Cagri Tanriover, Bahram Honary
IMA
1999
Springer
73views Cryptology» more  IMA 1999»
14 years 26 days ago
A Cryptographic Application of Weil Descent
Steven D. Galbraith, Nigel P. Smart
FSE
1999
Springer
101views Cryptology» more  FSE 1999»
14 years 27 days ago
Mod n Cryptanalysis, with Applications Against RC5P and M6
We introduce “mod n cryptanalysis,” a form of partitioning attack that is effective against ciphers which rely on modular addition and bit rotations for their security. We dem...
John Kelsey, Bruce Schneier, David Wagner
FSE
1999
Springer
73views Cryptology» more  FSE 1999»
14 years 27 days ago
Scramble All, Encrypt Small
Markus Jakobsson, Julien P. Stern, Moti Yung
FSE
1999
Springer
83views Cryptology» more  FSE 1999»
14 years 27 days ago
On the Security of Double and 2-Key Triple Modes of Operation
The DES has reached the end of its lifetime due to its too short key length and block length (56 and 64 bits respectively). As we are awaiting the new AES, triple (and double) encr...
Helena Handschuh, Bart Preneel
FSE
1999
Springer
92views Cryptology» more  FSE 1999»
14 years 27 days ago
A New Characterization of Almost Bent Functions
We study the functions from Fm 2 into Fm 2 for odd m which oppose an optimal resistance to linear cryptanalysis. These functions are called almost bent. It is known that almost ben...
Anne Canteaut, Pascale Charpin, Hans Dobbertin
FSE
1999
Springer
137views Cryptology» more  FSE 1999»
14 years 27 days ago
Linear Cryptanalysis of RC5 and RC6
In this paper we evaluate the resistance of the block cipher RC5 against linear cryptanalysis. We describe a known plaintext attack that can break RC5-32 (blocksize 64) with 10 rou...
Johan Borst, Bart Preneel, Joos Vandewalle
FSE
1999
Springer
89views Cryptology» more  FSE 1999»
14 years 27 days ago
Slide Attacks
Recently a powerful cryptanalytic tool—the slide attack— was introduced [3]. Slide attacks are very successful in breaking iterative ciphers with a high degree of self-similari...
Alex Biryukov, David Wagner
FSE
1999
Springer
94views Cryptology» more  FSE 1999»
14 years 27 days ago
On the Construction of Variable-Input-Length Ciphers
Whereas a block cipher enciphers messages of some one particular length the blocklength, a variable-input-length cipher takes messages of varying and preferably arbitrary leng...
Mihir Bellare, Phillip Rogaway