Sciweavers

FSE
2006
Springer
174views Cryptology» more  FSE 2006»
14 years 3 months ago
Distinguishing Attacks on the Stream Cipher Py
The stream cipher Py designed by Biham and Seberry is a submission to the ECRYPT stream cipher competition. The cipher is based on two large arrays (one is 256 bytes and the other ...
Souradyuti Paul, Bart Preneel, Gautham Sekar
FSE
2006
Springer
124views Cryptology» more  FSE 2006»
14 years 3 months ago
Improved Linear Distinguishers for SNOW 2.0
In this paper we present new and more accurate estimates of the biases of the linear approximation of the FSM of the stream cipher SNOW 2.0. Based on improved bias estimates we als...
Kaisa Nyberg, Johan Wallén
FSE
2006
Springer
86views Cryptology» more  FSE 2006»
14 years 3 months ago
Upper Bounds on Algebraic Immunity of Boolean Power Functions
Yassir Nawaz, Guang Gong, Kishan Chand Gupta
FSE
2006
Springer
89views Cryptology» more  FSE 2006»
14 years 3 months ago
The Impact of Carries on the Complexity of Collision Attacks on SHA-1
In this article we present a detailed analysis of the impact
Florian Mendel, Norbert Pramstaller, Christian Rec...
FSE
2006
Springer
111views Cryptology» more  FSE 2006»
14 years 3 months ago
Analysis of Step-Reduced SHA-256
This is the first article analyzing the security of SHA-256 against fast collision search which considers the recent attacks by Wang et al. We show the limits of applying technique...
Florian Mendel, Norbert Pramstaller, Christian Rec...
FSE
2006
Springer
117views Cryptology» more  FSE 2006»
14 years 3 months ago
How Far Can We Go on the x64 Processors?
This paper studies the state-of-the-art software optimization methodology for symmetric cryptographic primitives on the new 64-bit x64 processors, AMD Athlon64 (AMD64) and Intel Pe...
Mitsuru Matsui
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
14 years 3 months ago
Collisions and Near-Collisions for Reduced-Round Tiger
We describe a collision-finding attack on 16 rounds of the Tiger hash function requiring the time for about 244 compression function invocations. Another attack generates pseudo-ne...
John Kelsey, Stefan Lucks
FSE
2006
Springer
95views Cryptology» more  FSE 2006»
14 years 3 months ago
Cryptanalysis of Achterbahn
We present several attacks against Achterbahn, one of the new stream ciphers proposed to the eSTREAM competition. Our best attack breaks the reduced version of the cipher with comp...
Thomas Johansson, Willi Meier, Frédé...
FSE
2006
Springer
132views Cryptology» more  FSE 2006»
14 years 3 months ago
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
In this paper, we define and analyze a new blockcipher mode of operation for encryption, CENC, which stands for Cipher-based ENCryption. CENC has the following advantages: (1) bey...
Tetsu Iwata