Sciweavers

FSE
2004
Springer
123views Cryptology» more  FSE 2004»
14 years 4 months ago
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware
Abstract. We present a fast involutional block cipher optimized for reconfigurable hardware implementations. ICEBERG uses 64-bit text blocks and 128-bit keys. All components are in...
François-Xavier Standaert, Gilles Piret, Ga...
FSE
2004
Springer
109views Cryptology» more  FSE 2004»
14 years 4 months ago
On the Additive Differential Probability of Exclusive-Or
We study the differential probability adp of exclusive-or when differences are expressed using addition modulo 2N . This function is important when analysing symmetric primitives t...
Helger Lipmaa, Johan Wallén, Philippe Dumas
FSE
2004
Springer
82views Cryptology» more  FSE 2004»
14 years 4 months ago
Resistance of S-Boxes against Algebraic Attacks
Abstract. We develop several tools to derive linear independent multivariate equations from algebraic S-boxes. By applying them to maximally nonlinear power functions with the inve...
Jung Hee Cheon, Dong Hoon Lee 0002
FSE
2004
Springer
125views Cryptology» more  FSE 2004»
14 years 4 months ago
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
ded abstract of this paper appears in Fast Software Encryption, FSE 2004, Lecture Notes in Computer Science, W. Meier and B. Roy editors, Springer-Verlag, 2004. This is the full ve...
Tetsu Iwata, Tadayoshi Kohno
FSE
2004
Springer
92views Cryptology» more  FSE 2004»
14 years 5 months ago
Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions
Recent research shows that the class of Rotation Symmetric Boolean Functions (RSBFs), i.e., the class of Boolean functions that are invariant under circular translation of indices,...
Pantelimon Stanica, Subhamoy Maitra, John A. Clark
FSE
2004
Springer
110views Cryptology» more  FSE 2004»
14 years 5 months ago
VMPC One-Way Function and Stream Cipher
Abstract. A simple one-way function along with its proposed application in symmetric cryptography is described. The function is computable with three elementary operations on permu...
Bartosz Zoltak
FSE
2004
Springer
167views Cryptology» more  FSE 2004»
14 years 5 months ago
Nonce-Based Symmetric Encryption
Symmetric encryption schemes are usually formalized so as to make the encryption operation a probabilistic or state-dependent function E of the message M and the key K: the user su...
Phillip Rogaway
FSE
2004
Springer
113views Cryptology» more  FSE 2004»
14 years 5 months ago
Minimum Distance between Bent and 1-Resilient Boolean Functions
In this paper we study the minimum distance between the set of bent functions and the set of 1-resilient Boolean functions and present a lower bound on that. The bound is proved to...
Soumen Maity, Subhamoy Maitra
FSE
2004
Springer
150views Cryptology» more  FSE 2004»
14 years 5 months ago
Ciphers Secure against Related-Key Attacks
Abstract. In a related-key attack, the adversary is allowed to transform the secret key and request encryptions of plaintexts under the transformed key. This paper studies the secu...
Stefan Lucks