Sciweavers

INDOCRYPT
2000
Springer
14 years 3 months ago
Improved Impossible Differentials on Twofish
Eli Biham, Vladimir Furman
PKC
1998
Springer
123views Cryptology» more  PKC 1998»
14 years 3 months ago
Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map
In this paper, we present two efficient algorithms computing scalar multiplications of a point in an elliptic curve defined over a small finite field, the Frobenius map of which ha...
Jung Hee Cheon, Sung-Mo Park, Sangwoo Park, Daeho ...
FSE
2000
Springer
96views Cryptology» more  FSE 2000»
14 years 3 months ago
On the Interpolation Attacks on Block Ciphers
Abstract. The complexity of interpolation attacks on block ciphers depends on the degree of the polynomial approximation and or on the number of terms in the polynomial approximati...
Amr M. Youssef, Guang Gong
FSE
2000
Springer
142views Cryptology» more  FSE 2000»
14 years 3 months ago
Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family
Abstract. This paper presents a linear cryptanalytic attack against reduced round variants of the SAFER family of block ciphers. Compared
Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle
FSE
2000
Springer
80views Cryptology» more  FSE 2000»
14 years 3 months ago
Stochastic Cryptanalysis of Crypton
Abstract. Crypton is a 12-round blockcipher proposed as an AES candidate by C.H. Lim in 1998. In this paper, we show how to exploit some statistical deficiencies of the Crypton rou...
Marine Minier, Henri Gilbert
FSE
2000
Springer
107views Cryptology» more  FSE 2000»
14 years 3 months ago
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent
Abstract. We introduce a new cryptanalytic technique based on Wagner's boomerang and inside-out attacks. We first describe this new attack in terms of the original boomerang a...
John Kelsey, Tadayoshi Kohno, Bruce Schneier
FSE
2000
Springer
128views Cryptology» more  FSE 2000»
14 years 3 months ago
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators
This paper presents an operational reconstruction technique of most stream ciphers. We primarily expose it for key-stream generators which consist of several linear feedback shift ...
Anne Canteaut, Eric Filiol
FSE
2000
Springer
91views Cryptology» more  FSE 2000»
14 years 3 months ago
A Statistical Attack on RC6
This paper details the attack on RC6 which was announced in a report published in the proceedings of the second AES candidate conference (March 1999). Based on an observation on th...
Henri Gilbert, Helena Handschuh, Antoine Joux, Ser...