Sciweavers

FSE
2010
Springer
153views Cryptology» more  FSE 2010»
14 years 1 months ago
Finding Preimages of Tiger Up to 23 Steps
Lei Wang, Yu Sasaki
FSE
2010
Springer
230views Cryptology» more  FSE 2010»
14 years 1 months ago
Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher
Olivier Billet, Jonathan Etrog, Henri Gilbert
FSE
2010
Springer
153views Cryptology» more  FSE 2010»
14 years 1 months ago
Rotational Cryptanalysis of ARX
In this paper we analyze the security of systems based on modular additions, rotations, and XORs (ARX systems). We provide both theoretical support for their security and practical...
Dmitry Khovratovich, Ivica Nikolic
FSE
2010
Springer
121views Cryptology» more  FSE 2010»
14 years 1 months ago
Nonlinear Equivalence of Stream Ciphers
Sondre Rønjom, Carlos Cid
FSE
2010
Springer
124views Cryptology» more  FSE 2010»
14 years 1 months ago
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
FSE
2010
Springer
147views Cryptology» more  FSE 2010»
14 years 1 months ago
Security Analysis of the Mode of JH Hash Function
Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nan...
FSE
2010
Springer
132views Cryptology» more  FSE 2010»
14 years 1 months ago
Rebound Attack on Reduced-Round Versions of JH
Abstract. JH, designed by Wu, is one of the 14 second round candidates in the NIST Hash Competition. This paper presents the first analysis results of JH by using rebound attack. ...
Vincent Rijmen, Deniz Toz, Kerem Varici
FSE
2010
Springer
140views Cryptology» more  FSE 2010»
14 years 1 months ago
Cryptanalysis of ESSENCE
ESSENCE is a hash function submitted to the NIST Hash Competition that stands out as a hardware-friendly and highly parallelizable design. Previous analysis showed some non-randomn...
María Naya-Plasencia, Andrea Röck, Jea...
FSE
2010
Springer
132views Cryptology» more  FSE 2010»
14 years 1 months ago
Attacking the Knudsen-Preneel Compression Functions
Onur Özen, Thomas Shrimpton, Martijn Stam
FSE
2010
Springer
144views Cryptology» more  FSE 2010»
14 years 1 months ago
Pseudo-cryptanalysis of the Original Blue Midnight Wish
The hash function Blue Midnight Wish (BMW) is a candidate in the SHA-3 competition organised by the U.S. National Institute of Standards and Technology (NIST). BMW was selected fo...
Søren S. Thomsen