×

Found 70 Documents (Results 1–70)

Links among impossible differential, integral and zero correlation linear cryptanalysis. (English) Zbl 1347.94059

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 95-115 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new classification of 4-bit optimal S-boxes and its application to PRESENT, RECTANGLE and SPONGENT. (English) Zbl 1382.94172

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 494-515 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Collision attack on 5 rounds of Grøstl. (English) Zbl 1382.94140

Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 509-521 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

ALE: AES-based lightweight authenticated encryption. (English) Zbl 1321.94042

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 447-466 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of reduced-round SIMON32 and SIMON48. (English) Zbl 1344.94077

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 143-160 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Higher-order threshold implementations. (English) Zbl 1317.94086

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 326-343 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

A more efficient AES threshold implementation. (English) Zbl 1288.94053

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 267-284 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Extracts from the SHA-3 competition. (English) Zbl 1327.94070

Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 81-85 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Key difference invariant bias in block ciphers. (English) Zbl 1327.94034

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 357-376 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved impossible differential attacks on large-block Rijndael. (English) Zbl 1342.94101

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 126-140 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Collisions for the WIDEA-8 compression function. (English) Zbl 1312.94078

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 162-173 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Collision attack on the Hamsi-256 compression function. (English) Zbl 1295.94100

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 156-171 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Differential analysis of the LED block cipher. (English) Zbl 1292.94112

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 190-207 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Threshold implementations of all \(3 \times 3\) and \(4 \times 4\) S-boxes. (English) Zbl 1366.94478

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 76-91 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Correlation analysis in \(\mathrm{GF}(2^n)\). (English) Zbl 1293.94062

Junod, Pascal (ed.) et al., Advanced linear cryptanalysis of block and stream ciphers. Amsterdam: IOS Press (ISBN 978-1-60750-843-4/hbk; 978-1-60750-844-1/ebook). Cryptology and Information Security Series 7, 115-131 (2011).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

Optimal covering codes for finding near-collisions. (English) Zbl 1293.94084

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 187-197 (2011).
PDFBibTeX XMLCite
Full Text: DOI

Improved impossible differential cryptanalysis of 7-round AES-128. (English) Zbl 1253.94060

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 282-291 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Rebound attack on reduced-round versions of JH. (English) Zbl 1279.94112

Hong, Seokhie (ed.) et al., Fast software encryption. 17th international workshop, FSE 2010, Seoul, Korea, February 7–10, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-13857-7/pbk). Lecture Notes in Computer Science 6147, 286-303 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Rebound distinguishers: results on the full Whirlpool compression function. (English) Zbl 1267.94079

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 126-143 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. (English) Zbl 1177.94012

Lecture Notes in Computer Science 5867. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). xiii, 467 p. (2009).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Enhancing cryptographic primitives with techniques from error correcting codes. Proceedings of the NATO advanced research workshop, Veliko Tarnovo, Bulagaria, 6–9 October 2008. (English) Zbl 1175.94002

NATO Science for Peace and Security Series D: Information and Communication Security 23. Amsterdam: IOS Press (ISBN 978-1-60750-002-5/hbk). viii, 273 p. (2009).
PDFBibTeX XMLCite

Secure hardware implementation of non-linear functions in the presence of glitches. (English) Zbl 1239.94059

Lee, Pil Joong (ed.) et al., Information security and cryptology – ICISC 2008. 11th international conference, Seoul, Korea, December 3–5, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-00729-3/pbk). Lecture Notes in Computer Science 5461, 218-234 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. (English) Zbl 1154.94005

Lecture Notes in Computer Science 5365. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). xv, 437 p. (2008).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Correlated keystreams in Moustique. (English) Zbl 1142.94347

Vaudenay, Serge (ed.), Progress in cryptology – AFRICACRYPT 2008. First international conference on cryptology in Africa, Casablanca, Morocco, June 11–14, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68159-5/pbk). Lecture Notes in Computer Science 5023, 246-257 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

On authentication with HMAC and non-random properties. (English) Zbl 1195.94075

Dietrich, Sven (ed.) et al., Financial cryptography and data security. 11th international conference, FC 2007, and 1st international workshop on usable security, USEC 2007, Scarborough, Trinidad and Tobago, February 12–16, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-77365-8/pbk). Lecture Notes in Computer Science 4886, 119-133 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Second preimages for iterated hash functions and their implications on MACs. (English) Zbl 1213.94128

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 68-81 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the Tiger hash function. (English) Zbl 1153.94410

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 536-550 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Known-key distinguishers for some block ciphers. (English) Zbl 1153.94403

Kurosawa, Kaoru (ed.), Advances in cryptology – ASIACRYPT 2007. 13th international conference on the theory and application of cryptology and information security, Kuching, Malaysia, December 2-6, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76899-9/pbk). Lecture Notes in Computer Science 4833, 315-324 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Weaknesses in the HAS-V compression function. (English) Zbl 1337.94057

Nam, Kil-Hyun (ed.) et al., Information security and cryptology – ICISC 2007. 10th international conference, Seoul, Korea, November 29–30, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76787-9/pbk). Lecture Notes in Computer Science 4817, 335-345 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Colliding message pair for 53-step HAS-160. (English) Zbl 1337.94056

Nam, Kil-Hyun (ed.) et al., Information security and cryptology – ICISC 2007. 10th international conference, Seoul, Korea, November 29–30, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76787-9/pbk). Lecture Notes in Computer Science 4817, 324-334 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

The impact of carries on the complexity of collision attacks on SHA-1. (English) Zbl 1234.94057

Robshaw, Matthew (ed.), Fast software encryption. 13th international workshop, FSE 2006, Graz, Austria, March 15–17, 2006. Revised selected papers. Berlin: Springer (ISBN 3-540-36597-4/pbk). Lecture Notes in Computer Science 4047, 278-292 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Analysis of step-reduced SHA-256. (English) Zbl 1234.94056

Robshaw, Matthew (ed.), Fast software encryption. 13th international workshop, FSE 2006, Graz, Austria, March 15–17, 2006. Revised selected papers. Berlin: Springer (ISBN 3-540-36597-4/pbk). Lecture Notes in Computer Science 4047, 126-143 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Understanding two-round differentials in AES. (English) Zbl 1152.94413

De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6–8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 78-94 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Threshold implementations against side-channel attacks and glitches. (English) Zbl 1239.94058

Ning, Peng (ed.) et al., Information and communications security. 8th international conference, ICICS 2006, Raleigh, NC, USA, December 4–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49496-6/pbk). Lecture Notes in Computer Science 4307, 529-545 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

On the collision resistance of RIPEMD-160. (English) Zbl 1156.94368

Katsikas, Sokratis K. (ed.) et al., Information security. 9th international conference, ISC 2006, Samos Island, Greece, August 30–September 2, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38341-3/pbk). Lecture Notes in Computer Science 4176, 101-116 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Second preimages for SMASH. (English) Zbl 1177.94156

Abe, Masayuki (ed.), Topics in cryptology – CT-RSA 2007. The cryptographers’ track at the RSA conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-69327-7/pbk). Lecture Notes in Computer Science 4377, 101-111 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Update on Tiger. (English) Zbl 1175.94091

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 63-79 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Impact of rotations in SHA-1 and related hash functions. (English) Zbl 1151.94562

Preneel, Bart (ed.) et al., Selected areas in cryptography. 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11–12, 2005. Revised selected papers. Berlin: Springer (ISBN 978-3-540-33108-7/pbk). Lecture Notes in Computer Science 3897, 261-275 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Breaking a new hash function design strategy called SMASH. (English) Zbl 1151.94561

Preneel, Bart (ed.) et al., Selected areas in cryptography. 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11–12, 2005. Revised selected papers. Berlin: Springer (ISBN 978-3-540-33108-7/pbk). Lecture Notes in Computer Science 3897, 233-244 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Exploiting coding theory for collision attacks on SHA-1. (English) Zbl 1122.94042

Smart, Nigel P. (ed.), Cryptography and coding. 10th IMA international conference, Cirencester, UK, December 19–21, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30276-X/pbk). Lecture Notes in Computer Science 3796, 78-95 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A side-channel analysis resistant description of the AES S-box. (English) Zbl 1140.94366

Gilbert, Henri (ed.) et al., Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21–23, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-26541-4/pbk). Lecture Notes in Computer Science 3557, 413-423 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Update on SHA-1. (English) Zbl 1079.94571

Menezes, Alfred (ed.), Topics in cryptology – CT-RSA 2005. The cryptographers’ track at the RSA conference 2005, San Francisco, CA, USA, February 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24399-2/pbk). Lecture Notes in Computer Science 3376, 58-71 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Representations and Rijndael descriptions. (English) Zbl 1117.94336

Dobbertin, Hans (ed.) et al., Advanced encryption standard – AES. 4th international conference, AES 2004, Bonn, Germany, May 10–12, 2004. Revised selected and invited papers. Berlin: Springer (ISBN 3-540-26557-0/pbk). Lecture Notes in Computer Science 3373, 148-158 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Advanced encryption standard – AES. 4th international conference, AES 2004, Bonn, Germany, May 10–12, 2004. Revised selected and invited papers. (English) Zbl 1067.94003

Lecture Notes in Computer Science 3373. Berlin: Springer (ISBN 3-540-26557-0/pbk). x, 189 p. (2005).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Periodic properties of counter assisted stream ciphers. (English) Zbl 1196.94066

Okamoto, Tatsuaki (ed.), Topics in cryptology – CT-RSA 2004. The cryptographers’ track at the RSA conference 2004, San Francisco, CA, USA, February 23–27, 2004. Proceedings. Berlin: Springer (ISBN 3-540-20996-4/pbk). Lecture Notes in Computer Science 2964, 39-53 (2004).
MSC:  94A60 94A55
PDFBibTeX XMLCite
Full Text: DOI

Improved SQUARE attacks against reduced-round HIEROCRYPT. (English) Zbl 1073.68617

Matsui, Mitsuru (ed.), Fast software encryption. 8th international workshop, FSE 2001, Yokohama, Japan, April 2–4, 2001. Revised papers. Berlin: Springer (ISBN 3-540-43869-6). Lect. Notes Comput. Sci. 2355, 165-173 (2002).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

AES and the wide trail design strategy. (English) Zbl 1055.94514

Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 108-109 (2002).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

The quantum entanglement of binary and bipolar sequences. (English) Zbl 1043.94540

Helleseth, Tor (ed.) et al., Sequences and their applications. Proceedings of the 2nd international conference (SETA’01), Bergen, Norway, May 13–17, 2001. London: Springer (ISBN 1-85233-529-7). Discrete Mathematics and Theoretical Computer Science, 296-309 (2002).
MSC:  94B05 94A55 81P68
PDFBibTeX XMLCite
Full Text: arXiv

Security of a wide trail design. (English) Zbl 1033.94519

Menezes, Alfred (ed.) et al., Progress in cryptology – INDOCRYPT 2002. Third international conference on cryptology in India, Hyderabad, India, December 16–18, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00263-4/pbk). Lect. Notes Comput. Sci. 2551, 1-11 (2002).
MSC:  94A60 68P25 68M07
PDFBibTeX XMLCite
Full Text: Link

Fast software encryption. 9th international workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002. Revised papers. (English) Zbl 0992.00051

Lecture Notes in Computer Science. 2365. Berlin: Springer. xi, 277 p. (2002).
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software