Sciweavers

FSE
2007
Springer
115views Cryptology» more  FSE 2007»
14 years 5 months ago
Improving the Security of MACs Via Randomized Message Preprocessing
Abstract. “Hash then encrypt” is an approach to message authentication, where first the message is hashed down using an ε-universal hash function, and then the resulting k-bi...
Yevgeniy Dodis, Krzysztof Pietrzak
FSE
2007
Springer
263views Cryptology» more  FSE 2007»
14 years 5 months ago
Bad and Good Ways of Post-processing Biased Physical Random Numbers
Algorithmic post-processing is used to overcome statistical deficiencies of physical random number generators. We show that the quasigroup based approach for post-processing rando...
Markus Dichtl
FSE
2007
Springer
101views Cryptology» more  FSE 2007»
14 years 5 months ago
Producing Collisions for Panama, Instantaneously
We present a practical attack on the Panama hash function that generates a collision in 26 evaluations of the state updating function. Our attack improves that of Rijmen and cowork...
Joan Daemen, Gilles Van Assche
FSE
2007
Springer
101views Cryptology» more  FSE 2007»
14 years 5 months ago
Generalized Correlation Analysis of Vectorial Boolean Functions
We investigate the security of n-bit to m-bit vectorial Boolean functions in stream ciphers. Such stream ciphers have higher throughput than those using single-bit output Boolean f...
Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan...
FSE
2007
Springer
153views Cryptology» more  FSE 2007»
14 years 5 months ago
A New Attack on 6-Round IDEA
IDEA is a 64-bit block cipher with 128-bit keys introduced
Eli Biham, Orr Dunkelman, Nathan Keller
FSE
2007
Springer
103views Cryptology» more  FSE 2007»
14 years 5 months ago
Improved Slide Attacks
Abstract. The slide attack is applicable to ciphers that can be represented as an iterative application of the same keyed permutation. The slide attack leverages simple attacks on ...
Eli Biham, Orr Dunkelman, Nathan Keller
FSE
2007
Springer
87views Cryptology» more  FSE 2007»
14 years 5 months ago
On the Security of IV Dependent Stream Ciphers
CryptMT v3 is a stream cipher submitted to eStream project, and has entered the third evaluation phase. Any attack has not been found until now. In this paper, we mainly discuss th...
Côme Berbain, Henri Gilbert