Sciweavers

FSE
2007
Springer
105views Cryptology» more  FSE 2007»
14 years 5 months ago
New Bounds for PMAC, TMAC, and XCBC
We provide new security proofs for PMAC, TMAC, and XCBC message authentication modes. The previous security bounds for these modes were σ2 /2n , where n is the block size in bits ...
Kazuhiko Minematsu, Toshiyasu Matsushima
FSE
2007
Springer
129views Cryptology» more  FSE 2007»
14 years 5 months ago
Cryptanalysis of FORK-256
In this paper we present a cryptanalysis of a new 256-bit hash function, FORK-256, proposed by Hong et al. at FSE 2006. This cryptanalysis is based on some unexpected differential...
Krystian Matusiewicz, Thomas Peyrin, Olivier Bille...
FSE
2007
Springer
111views Cryptology» more  FSE 2007»
14 years 5 months ago
An Analysis of XSL Applied to BES
Abstract. Currently, the only plausible attack on the Advanced Encryption System (AES) is the XSL attack over F256 through the Big Encryption System (BES) embedding. In this paper,...
Chu-Wee Lim, Khoongming Khoo
FSE
2007
Springer
107views Cryptology» more  FSE 2007»
14 years 5 months ago
Message Freedom in MD4 and MD5 Collisions: Application to APOP
Abstract. In Wang’s attack, message modifications allow to deterministically satisfy certain sufficient conditions to find collisions efficiently. Unfortunately, message modi...
Gaëtan Leurent
FSE
2007
Springer
136views Cryptology» more  FSE 2007»
14 years 5 months ago
New Lightweight DES Variants
In this paper we propose a new block cipher, DESL (DES Lightweight), which is based on the classical DES (Data Encryption Standard) design, but unlike DES it uses a single S-box re...
Gregor Leander, Christof Paar, Axel Poschmann, Kai...
FSE
2007
Springer
123views Cryptology» more  FSE 2007»
14 years 5 months ago
The Grindahl Hash Functions
In this paper we propose the Grindahl hash functions, which are based on components of the Rijndael algorithm. To make collision search sufficiently difficult, this design has the...
Lars R. Knudsen, Christian Rechberger, Søre...
FSE
2007
Springer
250views Cryptology» more  FSE 2007»
14 years 5 months ago
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
This paper examines the security of AES-192 and AES-256 against a related-key rectangle attack. We find the following new attacks: 8-round reduced AES-192 with 2 related keys, 10-...
Jongsung Kim, Seokhie Hong, Bart Preneel
FSE
2007
Springer
94views Cryptology» more  FSE 2007»
14 years 5 months ago
Overtaking VEST
VEST is a set of four stream cipher families submitted by S. O’Neil, B. Gittins and H. Landman to the eSTREAM call for stream cipher proposals of the European project ECRYPT. The...
Antoine Joux, Jean-René Reinhard
FSE
2007
Springer
112views Cryptology» more  FSE 2007»
14 years 5 months ago
Perfect Block Ciphers with Small Blocks
Louis Granboulan, Thomas Pornin
FSE
2007
Springer
116views Cryptology» more  FSE 2007»
14 years 5 months ago
Two General Attacks on Pomaranch-Like Keystream Generators
Two general attacks that can be applied to all versions and variants of the Pomaranch stream cipher are presented. The attacks are demonstrated on all versions and succeed with com...
Håkan Englund, Martin Hell, Thomas Johansson