×

Found 58 Documents (Results 1–58)

Preimage attack on the parallel FFT-Hashing function. (English) Zbl 1213.94090

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 59-67 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved fast correlation attack on the shrinking and self-shrinking generators. (English) Zbl 1295.94086

Nguyen, Phong Q. (ed.), Progress in cryptology – VIETCRYPT 2006. First international conference on cryptology in Vietnam, Hanoi, Vietnam, September 25–28, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-68799-3/pbk). Lecture Notes in Computer Science 4341, 260-270 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new dedicated 256-bit hash function: FORK-256. (English) Zbl 1186.94446

Robshaw, Matthew (ed.), Fast software encryption. 13th international workshop, FSE 2006, Graz, Austria, March 15–17, 2006. Revised selected papers. Berlin: Springer (ISBN 3-540-36597-4/pbk). Lecture Notes in Computer Science 4047, 195-209 (2006).
MSC:  94A60 68P25 68N99
PDFBibTeX XMLCite
Full Text: DOI

Provable security for an RC6-like structure and a MISTY-FO-like structure against differential cryptanalysis. (English) Zbl 1172.68465

Gavrilova, Marina (ed.) et al., Computational science and its applications – ICCSA 2006. International conference, Glasgow, UK, May 8–11, 2006. Proceedings, Part III. Berlin: Springer (ISBN 3-540-34075-0/pbk). Lecture Notes in Computer Science 3982, 446-455 (2006).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

HIGHT: a new block cipher suitable for low-resource device. (English) Zbl 1307.94058

Goubin, Louis (ed.) et al., Cryptographic hardware and embedded systems – CHES 2006. 8th international workshop, Yokohama, Japan, October 10–13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-46559-1/pbk). Lecture Notes in Computer Science 4249, 46-59 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

High-speed RSA crypto-processor with radix-4 modular multiplication and Chinese remainder theorem. (English) Zbl 1272.94046

Rhee, Min Surp (ed.) et al., Information security and cryptology – ICISC 2006. 9th international conference, Busan, Korea, November 30–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49112-5/pbk). Lecture Notes in Computer Science 4296, 81-93 (2006).
MSC:  94A60 68M07
PDFBibTeX XMLCite
Full Text: DOI

Indifferentiable security analysis of popular hash functions with prefix-free padding. (English) Zbl 1172.94567

Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 283-298 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Forgery and key recovery attacks on pmac and mitchell’s tmac variant. (English) Zbl 1176.94049

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 421-431 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

How to construct universal one-way hash functions of order \(r\). (English) Zbl 1153.94391

Maitra, Subhamoy (ed.) et al., Progress in cryptology – INDOCRYPT 2005. 6th international conference on cryptology in India, Bangalore, India, December 10–12, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30805-8/pbk). Lecture Notes in Computer Science 3797, 63-76 (2005).
MSC:  94A60 68P25 68P30
PDFBibTeX XMLCite
Full Text: DOI

On the pseudorandomness of a modification of KASUMI type permutations. (English) Zbl 1133.94326

Park, Choonsik (ed.) et al., Information security and cryptology – ICISC 2004. 7th international conference, Seoul, Korea, December 2–3, 2004. Revised Selected Papers. Berlin: Springer (ISBN 978-3-540-26226-8/pbk). Lecture Notes in Computer Science 3506, 313-329 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Related-key differential attacks on Cobra-H64 and Cobra-H128. (English) Zbl 1122.94384

Smart, Nigel P. (ed.), Cryptography and coding. 10th IMA international conference, Cirencester, UK, December 19–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30276-X/pbk). Lecture Notes in Computer Science 3796, 201-219 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the security of encryption modes of MD4, MD5 and HAVAL. (English) Zbl 1122.94379

Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 147-158 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Related-key differential attacks on Cobra-S128, Cobra-f64a, and Cobra-f64b. (English) Zbl 1126.94331

Dawson, Ed (ed.) et al., Progress in cryptology – Mycrypt 2005. First international conference on cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28–30, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28938-0/pbk). Lecture Notes in Computer Science 3715, 244-262 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Related-key rectangle attacks on reduced versions of SHACAL-1 and AES-192. (English) Zbl 1140.94346

Gilbert, Henri (ed.) et al., Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21–23, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-26541-4/pbk). Lecture Notes in Computer Science 3557, 368-383 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security analysis of a 2/3-rate double length compression function in the black-box model. (English) Zbl 1140.94364

Gilbert, Henri (ed.) et al., Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21–23, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-26541-4/pbk). Lecture Notes in Computer Science 3557, 243-254 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Truncated differential attacks on 8-round CRYPTON. (English) Zbl 1092.94508

Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 446-456 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New block cipher: ARIA. (English) Zbl 1092.94509

Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 432-445 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential cryptanalysis of TEA and XTEA. (English) Zbl 1092.94507

Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 402-417 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Impossibility of construction of OWHF and UOWHF from PGV model based on block cipher secure against ACPCA. (English) Zbl 1113.94307

Canteaut, Anne (ed.) et al., Progress in cryptology – INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. Berlin: Springer (ISBN 3-540-24130-2/pbk). Lecture Notes in Computer Science 3348, 328-342 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Related-key attacks on DDP based ciphers: CIKS-128 and CIKS-128H. (English) Zbl 1113.94312

Canteaut, Anne (ed.) et al., Progress in cryptology – INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. Berlin: Springer (ISBN 3-540-24130-2/pbk). Lecture Notes in Computer Science 3348, 191-205 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Related-key attacks on reduced rounds of SHACAL-2. (English) Zbl 1113.94311

Canteaut, Anne (ed.) et al., Progress in cryptology – INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. Berlin: Springer (ISBN 3-540-24130-2/pbk). Lecture Notes in Computer Science 3348, 175-190 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A generalization of PGV-hash functions and security analysis in black-box model. (English) Zbl 1098.94622

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 212-223 (2004).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Related key differential cryptanalysis of full-round SPECTR-H64 and CIKS-1. (English) Zbl 1098.94620

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 137-148 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The related-key rectangle attack-application to SHACAL-1. (English) Zbl 1098.94619

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 123-136 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential-linear type attacks on reduced rounds of SHACAL-2. (English) Zbl 1098.94629

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 110-122 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Higher order universal one-way hash functions. (English) Zbl 1094.94512

Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 201-213 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improving the upper bound on the maximum differential and the maximum linear hull probability for SPN structures and AES. (English) Zbl 1254.94040

Johansson, Thomas (ed.), Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24–26, 2003. Revised papers. Berlin: Springer (ISBN 3-540-20449-0/pbk). Lect. Notes Comput. Sci. 2887, 247-260 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New parallel domain extenders for UOWHF. (English) Zbl 1205.94089

Laih, Chi Sung (ed.), Advances in cryptology – ASIACRYPT 2003. 9th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20592-6/pbk). Lect. Notes Comput. Sci. 2894, 208-227 (2003).
MSC:  94A60 68P25 68W10
PDFBibTeX XMLCite
Full Text: DOI

Impossible differential attack on 30-round SHACAL-2. (English) Zbl 1123.94345

Johansson, Thomas (ed.) et al., Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20609-4/pbk). Lect. Notes Comput. Sci. 2904, 97-106 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Impossible differential cryptanalysis for block cipher structures. (English) Zbl 1123.94352

Johansson, Thomas (ed.) et al., Progress in cryptology – INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8–10, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20609-4/pbk). Lect. Notes Comput. Sci. 2904, 82-96 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Key recovery attacks on the RMAC, TMAC, and IACBC. (English) Zbl 1044.94546

Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 265-273 (2003).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: Link

Full-round differential attack on the original version of the hash function proposed at PKC’98. (English) Zbl 1066.94539

Nyberg, Kaisa (ed.) et al., Selected areas in cryptography. 9th annual international workshop, SAC 2002, St. John’s, Newfoundland, Canada, August 15–16, 2002. Revised papers. Berlin: Springer (ISBN 3-540-00622-2/pbk). Lect. Notes Comput. Sci. 2595, 160-174 (2003).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

Impossible differential cryptanalysis of Zodiac. (English) Zbl 1073.68631

Matsui, Mitsuru (ed.), Fast software encryption. 8th international workshop, FSE 2001, Yokohama, Japan, April 2–4, 2001. Revised papers. Berlin: Springer (ISBN 3-540-43869-6). Lect. Notes Comput. Sci. 2355, 300-311 (2002).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

Saturation attacks on reduced round skipjack. (English) Zbl 1045.94521

Daemen, Joan (ed.) et al., Fast software encryption. 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised papers. Berlin: Springer (ISBN 3-540-44009-7). Lect. Notes Comput. Sci. 2365, 100-111 (2002).
MSC:  94A60 68N99 68P25
PDFBibTeX XMLCite
Full Text: Link

Impossible differential cryptanalysis of reduced round XTEA and TEA. (English) Zbl 1045.94529

Daemen, Joan (ed.) et al., Fast software encryption. 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised papers. Berlin: Springer (ISBN 3-540-44009-7). Lect. Notes Comput. Sci. 2365, 49-60 (2002).
MSC:  94A60 68N99 68P25
PDFBibTeX XMLCite
Full Text: Link

Potential weaknesses of the commutator key agreement protocol based on braid groups. (English) Zbl 1055.94019

Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 14-28 (2002).
PDFBibTeX XMLCite
Full Text: Link

An improved method of multiplication on certain elliptic curves. (English) Zbl 1055.94528

Naccache, David (ed.) et al., Public key cryptography. 5th international workshop on practice and theory in public key cryptosystems, PKC 2001, Paris, France, February 12–14, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43168-3). Lect. Notes Comput. Sci. 2274, 310-322 (2002).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: Link

A chosen plaintext linear attack on block cipher CIKS-1. (English) Zbl 1023.94530

Deng, Robert (ed.) et al., Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9-12, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2513, 456-468 (2002).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

A practical approach defeating blackmailing. (English) Zbl 1024.94518

Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 464-481 (2002).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

Amplified boomerang attack against reduced-round SHACAL. (English) Zbl 1065.94553

Zheng, Yuliang (ed.), Advances in cryptology - ASIACRYPT 2002. 8th international conference on the theory and application of cryptology and information security, Queenstown, New Zealand, December 1–5, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00171-9). Lect. Notes Comput. Sci. 2501, 243-253 (2002).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Concrete security analysis of CTR-OFB and CTR-CFB modes of operation. (English) Zbl 1003.68739

Kim, Kwangjo (ed.), Information security and cryptology - ICISC 2001. 4th international conference, Seoul, Korea, December 6-7, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2288, 103-113 (2002).
MSC:  68U99 68P25 94A60
PDFBibTeX XMLCite

Known-IV attacks on triple modes of operation of block ciphers. (English) Zbl 1062.94548

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 208-221 (2001).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

An efficient implementation of braid groups. (English) Zbl 1062.94546

Boyd, Colin (ed.), Advances in cryptology - ASIACRYPT 2001. 7th international conference on the theory and application of cryptology and information security, Gold Coast, Australia, December 9–13, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42987-5). Lect. Notes Comput. Sci. 2248, 144-156 (2001).
MSC:  94A60 20F36 68W01
PDFBibTeX XMLCite
Full Text: Link

Provable security against differential and linear cryptanalysis for the SPN structure. (English) Zbl 0994.68505

Schneier, Bruce (ed.), Fast software encryption. 7th international workshop, FSE 2000, New York, NY, USA, April 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1978, 273-283 (2001).
MSC:  68P25 94A60
PDFBibTeX XMLCite

Difference distribution attack on DONUT and improved DONUT. (English) Zbl 0977.94017

Won, Dongho (ed.), Information security and cryptology - ICISC 2000. 3rd international conference, Seoul, Korea, December 8-9, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2015, 37-48 (2001).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

New public-key cryptosystem using braid groups. (English) Zbl 0995.94531

Bellare, Mihir (ed.), Advances in cryptology - CRYPTO 2000. 20th annual international conference, Santa Barbara, CA, USA, August 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1880, 166-183 (2000).
MSC:  94A60 20F36
PDFBibTeX XMLCite

A proposal of a new public key cryptosystem using matrices over a ring. (English) Zbl 0963.94014

Dawson, Ed (ed.) et al., Information security and privacy. 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1841, 41-48 (2000).
MSC:  94A60
PDFBibTeX XMLCite

New block cipher DONUT using pairwise perfect decorrelation. (English) Zbl 0963.94023

Roy, Bimal (ed.) et al., Progress in cryptology - INDOCRYPT 2000. 1st international conference in cryptology in India, Calcutta, India, December 10-13, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1977, 262-270 (2000).
MSC:  94A60
PDFBibTeX XMLCite

Provable security for the skipjack-like structure against differential cryptanalysis and linear cryptanalysis. (English) Zbl 0965.94016

Okamoto, Tatsua (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 274-288 (2000).
MSC:  94A60
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software