Sciweavers

FSE
2008
Springer
115views Cryptology» more  FSE 2008»
13 years 11 months ago
On the Salsa20 Core Function
In this paper, we point out some weaknesses in the Salsa20 core function that could be exploited to obtain up to 231 collisions for its full (20 rounds) version. We first find an i...
Julio César Hernández Castro, Juan M...
FSE
2008
Springer
141views Cryptology» more  FSE 2008»
13 years 11 months ago
Collisions for Step-Reduced SHA-256
In this article we find collisions for step-reduced SHA-256. We develop a differential that holds with high probability if the message satisfies certain conditions. We solve the eq...
Ivica Nikolic, Alex Biryukov
FSE
2008
Springer
110views Cryptology» more  FSE 2008»
13 years 11 months ago
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent
Baudoin Collard, François-Xavier Standaert,...
FSE
2008
Springer
91views Cryptology» more  FSE 2008»
13 years 11 months ago
SWIFFT: A Modest Proposal for FFT Hashing
We propose SWIFFT, a collection of compression functions that are highly parallelizable and admit very efficient implementations on modern microprocessors. The main technique under...
Vadim Lyubashevsky, Daniele Micciancio, Chris Peik...
FSE
2008
Springer
143views Cryptology» more  FSE 2008»
13 years 11 months ago
Algebraic and Slide Attacks on KeeLoq
KeeLoq is a block cipher used in wireless devices that unlock the doors and alarms in cars manufactured by Chrysler, Daewoo, Fiat, GM, Honda, Jaguar, Toyota, Volvo, Volkswagen, etc...
Nicolas Courtois, Gregory V. Bard, David Wagner
FSE
2008
Springer
72views Cryptology» more  FSE 2008»
13 years 11 months ago
A Unified Approach to Related-Key Attacks
Eli Biham, Orr Dunkelman, Nathan Keller
FSE
2008
Springer
109views Cryptology» more  FSE 2008»
13 years 11 months ago
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis
Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouf...
FSE
2008
Springer
111views Cryptology» more  FSE 2008»
13 years 11 months ago
The Hash Function Family LAKE
The aim of this paper is to advocate a new software-oriented hash function family based on the HAIFA framework of Biham and Dunkelman, inheriting built-in randomized hashing and hi...
Jean-Philippe Aumasson, Willi Meier, Raphael C.-W....
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
13 years 11 months ago
A Meet-in-the-Middle Attack on 8-Round AES
We present a 5-round distinguisher for AES. We exploit this distinguisher to develop a meet-in-the-middle attack on 7 rounds of AES192 and 8 rounds of AES-256. We also give a time-...
Hüseyin Demirci, Ali Aydin Selçuk