×

Found 12 Documents (Results 1–12)

Differential fault analysis of streebog. (English) Zbl 1403.94040

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 35-49 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Second preimage analysis of Whirlwind. (English) Zbl 1400.94109

Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 311-328 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Impossible differential properties of reduced round Streebog. (English) Zbl 1441.94065

El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer. Lect. Notes Comput. Sci. 9084, 274-286 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A higher order key partitioning attack with application to LBlock. (English) Zbl 1441.94067

El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer. Lect. Notes Comput. Sci. 9084, 215-227 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential sieving for 2-step matching meet-in-the-middle attack with application to lblock. (English) Zbl 1382.94039

Eisenbarth, Thomas (ed.) et al., Lightweight cryptography for security and privacy. Third international workshop, LightSec 2014, Istanbul, Turkey, September 1–2, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16362-8/pbk; 978-3-319-16363-5/ebook). Lecture Notes in Computer Science 8898, 126-139 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Meet-in-the-middle attacks on reduced-round Hierocrypt-3. (English) Zbl 1370.94474

Lauter, Kristin (ed.) et al., Progress in cryptology – LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 187-203 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Rebound attacks on Stribog. (English) Zbl 1368.94081

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 175-188 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Preimage attacks on reduced-round Stribog. (English) Zbl 1288.94048

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 109-125 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A heuristic for finding compatible differential paths with application to HAS-160. (English) Zbl 1326.94104

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 464-483 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

Year of Publication

Main Field

Software