Sciweavers

ACNS
2008
Springer
102views Cryptology» more  ACNS 2008»
14 years 1 months ago
Repelling Detour Attack Against Onions with Re-encryption
Marek Klonowski, Miroslaw Kutylowski, Anna Lauks
ACNS
2008
Springer
143views Cryptology» more  ACNS 2008»
14 years 1 months ago
On the Security of the CCM Encryption Mode and of a Slight Variant
In this paper, we present an analysis of the CCM mode of operations and of a slight variant. CCM is a simple and efficient encryption scheme which combines a CBC-MAC authentication...
Pierre-Alain Fouque, Gwenaëlle Martinet, Fr&e...
ACNS
2008
Springer
103views Cryptology» more  ACNS 2008»
14 years 1 months ago
A Very Compact "Perfectly Masked" S-Box for AES
Implementations of the Advanced Encryption Standard (AES), including hardware applications with limited resources (e.g., smart cards), may be vulnerable to “side-channel attacks...
D. Canright, Lejla Batina
ACNS
2008
Springer
107views Cryptology» more  ACNS 2008»
14 years 1 months ago
Attacking Reduced Round SHA-256
The SHA-256 hash function has started getting attention recently by the cryptanalysis community
Somitra Kumar Sanadhya, Palash Sarkar
ACNS
2008
Springer
147views Cryptology» more  ACNS 2008»
14 years 1 months ago
Multi-factor Authenticated Key Exchange
Abstract. In order to increase the security for authenticated key exchange protocols, various authentication means can be used together. In this paper, we introduce a security mode...
David Pointcheval, Sébastien Zimmer
SACRYPT
2009
Springer
176views Cryptology» more  SACRYPT 2009»
14 years 2 months ago
Optimization Strategies for Hardware-Based Cofactorization
Abstract. We use the specific structure of the inputs to the cofactorization step in the general number field sieve (GNFS) in order to optimize the runtime for the cofactorizatio...
Daniel Loebenberger, Jens Putzka
SACRYPT
2009
Springer
162views Cryptology» more  SACRYPT 2009»
14 years 2 months ago
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384
Abstract. In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complementation of whole registers turns out to be very useful for constructing...
Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, S...
SACRYPT
2009
Springer
142views Cryptology» more  SACRYPT 2009»
14 years 2 months ago
On Repeated Squarings in Binary Fields
Kimmo U. Järvinen
SACRYPT
2009
Springer
130views Cryptology» more  SACRYPT 2009»
14 years 2 months ago
Format-Preserving Encryption
Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a ...
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway,...
SACRYPT
2009
Springer
147views Cryptology» more  SACRYPT 2009»
14 years 2 months ago
A New Approach for FCSRs
The Feedback with Carry Shift Registers (FCSRs) have been proposed as an alternative to Linear Feedback Shift Registers (LFSRs) for the design of stream ciphers. FCSRs have good st...
François Arnault, Thierry P. Berger, C&eacu...