×

Found 62 Documents (Results 1–62)

Automatic search for linear trails of the SPECK family. (English) Zbl 1397.94110

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 158-176 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Structural evaluation for generalized Feistel structures and applications to LBlock and TWINE. (English) Zbl 1377.94070

Biryukov, Alex (ed.) et al., Progress in cryptology – INDOCRYPT 2015. 16th international conference on cryptology in India, Bangalore, India, December 6–9, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26616-9/pbk; 978-3-319-26617-6/ebook). Lecture Notes in Computer Science 9462, 218-237 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the round-reduced GOST hash function. (English) Zbl 1347.94067

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 309-322 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

LHash: a lightweight hash function. (English) Zbl 1347.94062

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 291-308 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

General model of the single-key meet-in-the-middle distinguisher on the word-oriented block cipher. (English) Zbl 1368.94113

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 203-223 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

First multidimensional cryptanalysis on reduced-round \(\mathrm{PRINCE}_{core}\). (English) Zbl 1368.94112

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 158-172 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Reflection cryptanalysis of Prince-like ciphers. (English) Zbl 1321.94090

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 71-91 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved multidimensional zero-correlation linear cryptanalysis and applications to lblock and TWINE. (English) Zbl 1318.94085

Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 1-16 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential cryptanalysis and linear distinguisher of full-round zorro. (English) Zbl 1353.94077

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 308-323 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Recursive diffusion layers for (lightweight) block ciphers and hash functions. (English) Zbl 1327.94079

Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 355-371 (2013).
MSC:  94A60 94A55
PDFBibTeX XMLCite
Full Text: DOI

Attacking and fixing the CS mode. (English) Zbl 1346.94125

Qing, Sihan (ed.) et al., Information and communications security. 15th international conference, ICICS 2013, Beijing, China, November 20–22, 2013. Proceedings. Berlin: Springer (ISBN 978-3-319-02725-8/pbk). Lecture Notes in Computer Science 8233, 318-330 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Leaked-state-forgery attack against the authenticated encryption algorithm ALE. (English) Zbl 1327.94086

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 377-404 (2013).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved key recovery attacks on reduced-round Salsa20 and ChaCha. (English) Zbl 1342.94096

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 337-351 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. (English) Zbl 1292.94134

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 562-579 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

3kf9: enhancing 3GPP-MAC beyond the birthday bound. (English) Zbl 1292.94162

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 296-312 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

(Pseudo) preimage attack on round-reduced Grøstl hash function and others. (English) Zbl 1312.94101

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 127-145 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of reduced-round KLEIN block cipher. (English) Zbl 1292.94159

Wu, Chuan-Kun (ed.) et al., Information security and cryptology. 7th international conference, Inscrypt 2011, Beijing, China, November 30–December 3, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34703-0/pbk). Lecture Notes in Computer Science 7537, 237-250 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Preimage attacks on step-reduced SM3 hash function. (English) Zbl 1365.94474

Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 375-390 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers. (English) Zbl 1319.94087

Bao, Feng (ed.) et al., Applied cryptography and network security. 10th international conference, ACNS 2012, Singapore, June 26–29, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31283-0/pbk). Lecture Notes in Computer Science 7341, 117-134 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Biclique cryptanalysis of reduced-round Piccolo block cipher. (English) Zbl 1292.94150

Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 337-352 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Polye+CTR: a swiss-army-knife mode for block ciphers. (English) Zbl 1298.94116

Boyen, Xavier (ed.) et al., Provable security. 5th international conference, ProvSec 2011, Xi’an, China, October 16–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24315-8/pbk). Lecture Notes in Computer Science 6980, 266-280 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Hyper-Sbox view of AES-like permutations: a generalized distinguisher. (English) Zbl 1295.94158

Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 155-168 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

LBlock: a lightweight block cipher. (English) Zbl 1250.94047

Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21553-7/pbk). Lecture Notes in Computer Science 6715, 327-344 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

BCBC: a more efficient MAC algorithm. (English) Zbl 1292.94172

Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 233-246 (2011).
MSC:  94A62 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Near-collisions on the reduced-round compression functions of Skein and BLAKE. (English) Zbl 1294.94081

Heng, Swee-Huay (ed.) et al., Cryptology and network security. 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12–14, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17618-0/pbk). Lecture Notes in Computer Science 6467, 124-139 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Proposition of two cipher structures. (English) Zbl 1281.94065

Bao, Feng (ed.) et al., Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). Lecture Notes in Computer Science 6151, 215-229 (2010).
MSC:  94A60 94B25
PDFBibTeX XMLCite
Full Text: DOI

Constructing rate-1 MACs from related-key unpredictable block ciphers: PGV model revisited. (English) Zbl 1279.94141

Hong, Seokhie (ed.) et al., Fast software encryption. 17th international workshop, FSE 2010, Seoul, Korea, February 7–10, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-13857-7/pbk). Lecture Notes in Computer Science 6147, 250-269 (2010).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the LANE hash function. (English) Zbl 1267.94103

Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 126-140 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved impossible differential cryptanalysis of reduced-round Camellia. (English) Zbl 1256.94069

Avanzi, Roberto Maria (ed.) et al., Selected areas in cryptography. 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14–15. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04158-7/pbk). Lecture Notes in Computer Science 5381, 442-456 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security of truncated MACs. (English) Zbl 1237.94097

Yung, Moti (ed.) et al., Information security and cryptology. 4th international conference, Inscrypt 2008, Beijing, China, December 14–17, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-642-01439-0/pbk). Lecture Notes in Computer Science 5487, 96-114 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Improved impossible differential attacks on large-block Rijndael. (English) Zbl 1181.94118

Wu, Tzong-Chen (ed.) et al., Information security. 11th international conference, ISC 2008, Taipei, Taiwan, September 15–18, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85884-3/pbk). Lecture Notes in Computer Science 5222, 298-315 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On the unprovable security of 2-key XCBC. (English) Zbl 1279.94123

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 230-238 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of reduced-round SMS4 block cipher. (English) Zbl 1279.94128

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 216-229 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New results on impossible differential cryptanalysis of reduced AES. (English) Zbl 1182.94049

Nam, Kil-Hyun (ed.) et al., Information security and cryptology – ICISC 2007. 10th international conference, Seoul, Korea, November 29–30, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-76787-9/pbk). Lecture Notes in Computer Science 4817, 239-250 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Related-key differential-linear attacks on reduced AES-192. (English) Zbl 1153.94444

Srinathan, K. (ed.) et al., Progress in cryptology – INDOCRYPT 2007. 8th international conference on cryptology in India, Chennai, India, December 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77025-1/pbk). Lecture Notes in Computer Science 4859, 73-85 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved related-key impossible differential attacks on reduced-round AES-192. (English) Zbl 1161.94434

Biham, Eli (ed.) et al., Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17–18, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74461-0/pbk). Lecture Notes in Computer Science 4356, 15-27 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Symmetric nonce respecting security model and the MEM mode of operation. (English) Zbl 1175.94099

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 280-286 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Integral cryptanalysis of reduced FOX block cipher. (English) Zbl 1185.94068

Won, Dongho (ed.) et al., Information security and cryptology – ICISC 2005. 8th international conference, Seoul, Korea, December 1–2, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-33354-1/pbk). Lecture Notes in Computer Science 3935, 229-241 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Collision attack and pseudorandomness of reduced-round Camellia. (English) Zbl 1117.94339

Handschuh, Helena (ed.) et al., Selected areas in cryptography. 11th international workshop, SAC 2004, Waterloo, Canada, August 9–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24327-5/pbk). Lecture Notes in Computer Science 3357, 252-266 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential-linear cryptanalysis of Camellia. (English) Zbl 1081.94542

Chen, Kefei (ed.), Progress on cryptography. 25 years of cryptography in China. Papers of an international workshop on progress on cryptography celebrating Guozhen Xiao’s 70th birthday. With a foreword by Xuejia Lai. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-7986-9/hbk). The Kluwer International Series in Engineering and Computer Science 769, 173-180 (2004).
MSC:  94A60
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

all top 3

Software