Sciweavers

DAGSTUHL
2007
13 years 9 months ago
Diagonal Circuit Identity Testing and Lower Bounds
In this paper we give the first deterministic polynomial time algorithm for testing whether a diagonal depth-3 circuit C(x1, . . . , xn) (i.e. C is a sum of powers of linear funct...
Nitin Saxena
DAGSTUHL
2007
13 years 9 months ago
An Information-Theoretic Model of Voting Systems
This paper presents an information-theoretic model of a voting system, consisting of (a) definitions of the desirable qualities of integrity, privacy and verifiability, and (b) ...
Benjamin Hosp, Poorvi L. Vora
DAGSTUHL
2007
13 years 9 months ago
How Fast can be Algebraic Attacks on Block Ciphers?
In this paper we give a specification of a new block cipher that can be called the Courtois Toy Cipher (CTC). It is quite simple, and yet very much like any other known block ciph...
Nicolas Courtois
DAGSTUHL
2007
13 years 9 months ago
A Collision-Resistant Rate-1 Double-Block-Length Hash Function
This paper proposes a construction for collision resistant 2n-bit hash functions, based on n-bit block ciphers with 2n-bit keys. The construction is analysed in the ideal cipher mo...
Stefan Lucks
DAGSTUHL
2007
13 years 9 months ago
07021 Abstracts Collection -- Symmetric Cryptography
Eli Biham, Helena Handschuh, Stefan Lucks, Vincent...
DAGSTUHL
2007
13 years 9 months ago
Tightness of the Security Bound of CENC
CENC (Cipher-based ENCryption) is the recently designed encryption mode for blockciphers. It is provably secure with beyond the birthday bound. In this note, we present a simple di...
Tetsu Iwata
DAGSTUHL
2007
13 years 9 months ago
QUAD: Overview and Recent Developments
We give an outline of the specification and provable security features of the QUAD stream cipher proposed at Eurocrypt 2006 [6]. The cipher relies on the iteration of a multivaria...
David Arditti, Côme Berbain, Olivier Billet,...
DAGSTUHL
2007
13 years 9 months ago
Design and Primitive Specification for Shannon
Gregory G. Rose, Philip Hawkes, Michael Paddon, Ca...
DAGSTUHL
2007
13 years 9 months ago
Block and Stream Ciphers and the Creatures in Between
In this paper we define a notion of leak extraction from a block cipher. We demonstrate this new concept on an example of AES. A result is LEX: a simple AES-based stream cipher wh...
Alex Biryukov