Sciweavers

SACRYPT
2000
Springer
107views Cryptology» more  SACRYPT 2000»
14 years 3 months ago
Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions
It has recently been shown that when m > 1 2 n - 1, the nonlinearity Nf of an mth-order correlation immune function f with n variables satisfies the condition of Nf 2n-1 - 2m ,...
Yuliang Zheng, Xian-Mo Zhang
SACRYPT
2000
Springer
14 years 3 months ago
LILI Keystream Generator
The LILI-128 keystream generator is a LFSR based synchronous stream cipher with a 128 bit key. The design offers large period and linear complexity, and is resistant to currently ...
Leonie Ruth Simpson, Ed Dawson, Jovan Dj. Golic, W...
SACRYPT
2000
Springer
118views Cryptology» more  SACRYPT 2000»
14 years 3 months ago
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
We present and analyze attacks on additive stream ciphers that rely on linear equations that hold with non-trivial probability in plaintexts that are encrypted using distinct keys....
David A. McGrew, Scott R. Fluhrer
SACRYPT
2000
Springer
145views Cryptology» more  SACRYPT 2000»
14 years 3 months ago
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis
We present a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e. the same interface specifications as the Advanced...
Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, M...