×

Found 37 Documents (Results 1–37)

On reverse-engineering S-boxes with hidden design criteria or structure. (English) Zbl 1347.94019

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 116-140 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of reduced-round Whirlwind. (English) Zbl 1356.94075

Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 20-38 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Structural evaluation by generalized integral property. (English) Zbl 1370.94545

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 287-314 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical attacks on AES-like cryptographic hash functions. (English) Zbl 1370.94520

Aranha, F. (ed.) et al., Progress in cryptology – LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17–19, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). Lecture Notes in Computer Science 8895, 259-273 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC. (English) Zbl 1414.94914

Sakiyama, Kazuo (ed.) et al., Advances in information and computer security. 8th international workshop on security, IWSEC 2013, Okinawa, Japan, November 18–20, 2013. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8231, 83-98 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

SPN-hash: improving the provable resistance against differential collision attacks. (English) Zbl 1304.94041

Mitrokotsa, Aikaterini (ed.) et al., Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). Lecture Notes in Computer Science 7374, 270-286 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Experimental verification of super-Sbox analysis – confirmation of detailed attack complexity. (English) Zbl 1344.94072

Iwata, Tetsu (ed.) et al., Advances in information and computer security. 6th international workshop, IWSEC 2011, Tokyo, Japan, November 8–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25140-5/pbk). Lecture Notes in Computer Science 7038, 178-192 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes. (English) Zbl 1307.94095

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 397-415 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool. (English) Zbl 1307.94094

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 378-396 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Collisions of MMO-MD5 and their impact on original MD5. (English) Zbl 1280.94093

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2011. 4th international conference on cryptology in Africa, Dakar, Senegal, July 5–7, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21968-9/pbk). Lecture Notes in Computer Science 6737, 117-133 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the diffusion of generalized Feistel structures regarding differential and linear cryptanalysis. (English) Zbl 1293.94095

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 211-228 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The first 30 years of cryptographic hash functions and the NIST SHA-3 competition. (English) Zbl 1272.94058

Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 1-14 (2010).
PDFBibTeX XMLCite
Full Text: DOI Link

Rebound distinguishers: results on the full Whirlpool compression function. (English) Zbl 1267.94079

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 126-143 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Rebound attack on the full Lane compression function. (English) Zbl 1267.94083

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 106-125 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hash functions and RFID tags: mind the gap. (English) Zbl 1184.68229

Oswald, Elisabeth (ed.) et al., Cryptographic hardware and embedded systems – CHES 2008. 10th international workshop, Washington, D.C., USA, August 10–13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85052-6/pbk). Lecture Notes in Computer Science 5154, 283-299 (2008).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

New applications of differential bounds of the SDS structure. (English) Zbl 1182.94038

Wu, Tzong-Chen (ed.) et al., Information security. 11th international conference, ISC 2008, Taipei, Taiwan, September 15–18, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85884-3/pbk). Lecture Notes in Computer Science 5222, 367-384 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Accelerating the whirlpool hash function using parallel table lookup and fast cyclical permutation. (English) Zbl 1154.68393

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 173-188 (2008).
MSC:  68P25 68N99 94A60
PDFBibTeX XMLCite
Full Text: DOI

How (not) to efficiently dither blockcipher-based hash functions? (English) Zbl 1142.94329

Vaudenay, Serge (ed.), Progress in cryptology – AFRICACRYPT 2008. First international conference on cryptology in Africa, Casablanca, Morocco, June 11–14, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68159-5/pbk). Lecture Notes in Computer Science 5023, 308-324 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The ideal-cipher model, revisited: An uninstantiable blockcipher-based hash function. (English) Zbl 1234.94028

Robshaw, Matthew (ed.), Fast software encryption. 13th international workshop, FSE 2006, Graz, Austria, March 15–17, 2006. Revised selected papers. Berlin: Springer (ISBN 3-540-36597-4/pbk). Lecture Notes in Computer Science 4047, 328-340 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On Feistel structures using a diffusion switching mechanism. (English) Zbl 1234.94066

Robshaw, Matthew (ed.), Fast software encryption. 13th international workshop, FSE 2006, Graz, Austria, March 15–17, 2006. Revised selected papers. Berlin: Springer (ISBN 3-540-36597-4/pbk). Lecture Notes in Computer Science 4047, 41-56 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A bit-slice implementation of the Whirlpool hash function. (English) Zbl 1177.94172

Abe, Masayuki (ed.), Topics in cryptology – CT-RSA 2007. The cryptographers’ track at the RSA conference 2007, San Francisco, CA, USA, February 5-9, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-69327-7/pbk). Lecture Notes in Computer Science 4377, 385-401 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the impossibility of efficiently combining collision resistant hash functions. (English) Zbl 1138.94347

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 570-583 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On Feistel ciphers using optimal diffusion mappings across multiple rounds. (English) Zbl 1094.94036

Lee, Pil Joong, Advances in cryptology – ASIACRYPT 2004. 10th international conference on the theory and application of cryptology and information security, Jeju Island, Korea, December 5–9, 2004. Proceedings. Berlin: Springer (ISBN 3-540-23975-8/pbk). Lecture Notes in Computer Science 3329, 1-15 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A toolbox for cryptanalysis: Linear and affine equivalence algorithms. (English) Zbl 1038.94521

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 33-50 (2003).
MSC:  94A60 68P25 94A17
PDFBibTeX XMLCite
Full Text: Link

Performance analysis and parallel implementation of dedicated hash functions. (English) Zbl 1055.68542

Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 165-180 (2002).
MSC:  68P25 94A60 68W10
PDFBibTeX XMLCite
Full Text: Link

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software