×

Found 17 Documents (Results 1–17)

Generic attacks on misty schemes. (English) Zbl 1285.94083

Abdalla, Michel (ed.) et al., Progress in cryptology – LATINCRYPT 2010. First international conference on cryptology and information security in Latin America, Puebla, Mexico, August 8–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14711-1/pbk). Lecture Notes in Computer Science 6212, 222-240 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

A practical-time related-key attack on the KASUMI cryptosystem used in GSM and 3G telephony. (English) Zbl 1283.94064

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 393-410 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Parallelizing the Camellia and SMS4 block ciphers. (English) Zbl 1284.94128

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 387-406 (2010).
PDFBibTeX XMLCite
Full Text: DOI

New applications of differential bounds of the SDS structure. (English) Zbl 1182.94038

Wu, Tzong-Chen (ed.) et al., Information security. 11th international conference, ISC 2008, Taipei, Taiwan, September 15–18, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85884-3/pbk). Lecture Notes in Computer Science 5222, 367-384 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A fast calculus for the linearizing attack and its application to an attack on KASUMI. (English) Zbl 1125.94027

Fossorier, Marc (ed.) et al., Applied algebra, algebraic algorithms and error-correcting codes. 16th international symposium, AAECC-16, Las Vegas, NV, USA, February 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-31423-7/pbk). Lecture Notes in Computer Science 3857, 163-172 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A related-key rectangle attack on the full KASUMI. (English) Zbl 1154.94375

Roy, Bimal (ed.), Advances in cryptology – ASIACRYPT 2005. 11th international conference on the theory and application of cryptology and information security, Chennai, India, December 4–8, 2005, Proceedings. Berlin: Springer (ISBN 978-3-540-30684-9/pbk). Lecture Notes in Computer Science 3788, 443-461 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the pseudorandomness of a modification of KASUMI type permutations. (English) Zbl 1133.94326

Park, Choonsik (ed.) et al., Information security and cryptology – ICISC 2004. 7th international conference, Seoul, Korea, December 2–3, 2004. Revised Selected Papers. Berlin: Springer (ISBN 978-3-540-26226-8/pbk). Lecture Notes in Computer Science 3506, 313-329 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

How to enhance the security of the 3GPP confidentiality and integrity algorithms. (English) Zbl 1140.94348

Gilbert, Henri (ed.) et al., Fast software encryption. 12th international workshop, FSE 2005, Paris, France, February 21–23, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-26541-4/pbk). Lecture Notes in Computer Science 3557, 268-283 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Block ciphers and systems of quadratic equations. (English) Zbl 1254.94027

Johansson, Thomas (ed.), Fast software encryption. 10th international workshop, FSE 2003, Lund, Sweden, February 24–26, 2003. Revised papers. Berlin: Springer (ISBN 3-540-20449-0/pbk). Lect. Notes Comput. Sci. 2887, 274-289 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the correctness of security proofs for the 3GPP confidentiality and integrity algorithms. (English) Zbl 1123.94347

Paterson, Kenneth G. (ed.), Cryptography and coding. 9th IMA international conference, Cirencester, UK, December 16–18, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20663-9/pbk). Lect. Notes Comput. Sci. 2898, 306-318 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the pseudorandomness of KASUMI type permutations. (English) Zbl 1044.94531

Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 130-141 (2003).
MSC:  94A60 68Q25 65C10
PDFBibTeX XMLCite
Full Text: Link

A toolbox for cryptanalysis: Linear and affine equivalence algorithms. (English) Zbl 1038.94521

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 33-50 (2003).
MSC:  94A60 68P25 94A17
PDFBibTeX XMLCite
Full Text: Link

Small and high-speed hardware architectures for the 3GPP standard cipher KASUMI. (English) Zbl 1019.68579

Chan, Agnes Hui (ed.) et al., Information security. 5th international conference, ISC 2002, Sao Paulo, Brazil, September 30 - October 2, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2433, 48-62 (2002).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software