×

Found 102 Documents (Results 1–100)

100
MathJax

Efficient implementation of SHA-3 hash function on 8-bit AVR-based sensor nodes. (English) Zbl 07497444

Hong, Deukjo (ed.), Information security and cryptology – ICISC 2020. 23rd international conference, Seoul, South Korea, December 2–4, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12593, 140-154 (2021).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI

A parallel GPU implementation of SWIFFTX. (English) Zbl 07441070

Slamanig, Daniel (ed.) et al., Mathematical aspects of computer and information sciences. 8th international conference, MACIS 2019, Gebze, Turkey, November 13–15, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11989, 202-217 (2020).
MSC:  68-XX 65-XX
PDF BibTeX XML Cite
Full Text: DOI

Cryptanalysis of round-reduced KECCAK using non-linear structures. (English) Zbl 1456.94109

Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11898, 175-192 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Preimage attacks on round-reduced Keccak-224/256 via an allocating approach. (English) Zbl 07162740

Ishai, Yuval (ed.) et al., Advances in cryptology – EUROCRYPT 2019. 38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11478, 556-584 (2019).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Cryptanalysis of 2 round Keccak-384. (English) Zbl 1407.94132

Chakraborty, Debrup (ed.) et al., Progress in cryptology – INDOCRYPT 2018. 19th international conference on cryptology in India, New Delhi, India, December 9–12, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11356, 120-133 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

New MILP modeling: improved conditional cube attacks on KECCAK-based constructions. (English) Zbl 1446.94159

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 65-95 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Cryptanalysis of 1-round KECCAK. (English) Zbl 1423.94082

Joux, Antoine (ed.) et al., Progress in cryptology – AFRICACRYPT 2018. 10th international conference on cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10831, 124-137 (2018).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Non-full Sbox linearization: applications to collision attacks on round-reduced keccak. (English) Zbl 1410.94108

Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10402, 428-451 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

New collision attacks on round-reduced Keccak. (English) Zbl 1415.94457

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10212, 216-243 (2017).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Linear structures: applications to cryptanalysis of round-reduced Keccak. (English) Zbl 1404.94078

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 249-274 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Provably robust sponge-based PRNGs and KDFs. (English) Zbl 1347.94033

Fischlin, Marc (ed.) et al., Advances in cryptology – EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8–12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 87-116 (2016).
MSC:  94A60 65C10
PDF BibTeX XML Cite
Full Text: DOI

Replacing SHA-2 with SHA-3 enhances generic security of HMAC. (English) Zbl 1334.94088

Sako, Kazue (ed.), Topics in cryptology – CT-RSA 2016. The cryptographers’ track at the RSA conference 2016, San Francisco, CA, USA, February 29 – March 4, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-29484-1/pbk; 978-3-319-29485-8/ebook). Lecture Notes in Computer Science 9610, 397-412 (2016).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Differential fault analysis of SHA-3. (English) Zbl 1377.94032

Biryukov, Alex (ed.) et al., Progress in cryptology – INDOCRYPT 2015. 16th international conference on cryptology in India, Bangalore, India, December 6–9, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26616-9/pbk; 978-3-319-26617-6/ebook). Lecture Notes in Computer Science 9462, 253-269 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function. (English) Zbl 1370.94506

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 733-761 (2015).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI Link

Internal differential boomerangs: practical analysis of the round-reduced Keccak-\(f\). (English) Zbl 1382.94124

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 537-556 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Collision attack on 5 rounds of Grøstl. (English) Zbl 1382.94140

Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 509-521 (2015).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Collision-correlation attack against a first-order masking scheme for MAC based on SHA-3. (English) Zbl 1440.94032

Prouff, Emmanuel (ed.), Constructive side-channel analysis and secure design. 5th international workshop, COSADE 2014, Paris, France, April 13–15, 2014. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 8622, 129-143 (2014).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

PAEQ: parallelizable permutation-based authenticated encryption. (English) Zbl 1336.94037

Chow, Sherman S. M. (ed.) et al., Information security. 17th international conference, ISC 2014, Hong Kong, China, October 12–14, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-13256-3/pbk). Lecture Notes in Computer Science 8783, 72-89 (2014).
MSC:  94A60 94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI Link

Partial-collision attack on the round-reduced compression function of Skein-256. (English) Zbl 1321.94096

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 263-283 (2014).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Rotational cryptanalysis of round-reduced Keccak. (English) Zbl 1321.94081

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 241-262 (2014).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. (English) Zbl 1321.94054

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 219-240 (2014).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Sakura: a flexible coding for tree hashing. (English) Zbl 1353.94036

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 217-234 (2014).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Differential biases in reduced-round Keccak. (English) Zbl 1288.94056

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 69-87 (2014).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Differential cryptanalysis of Keccak variants. (English) Zbl 1317.94118

Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 141-157 (2013).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

An integral distinguisher on Grøstl-512 v3. (English) Zbl 1291.94133

Paul, Goutam (ed.) et al., Progress in cryptology – INDOCRYPT 2013. 14th international conference on cryptology in India, Mumbai, India, December 7–10, 2013. Proceedings. Berlin: Springer (ISBN 978-3-319-03514-7/pbk). Lecture Notes in Computer Science 8250, 50-59 (2013).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Pushing the limits of SHA-3 hardware implementations to fit on RFID. (English) Zbl 1353.94068

Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems – CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 126-141 (2013).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Keccak. (English) Zbl 1306.94028

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 313-314 (2013).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Efficient vector implementations of AES-based designs: a case study and new implementations for Grøstl. (English) Zbl 1291.94098

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 145-161 (2013).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Bicliques for permutations: collision and preimage attacks in stronger settings. (English) Zbl 1292.94092

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 544-561 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

New attacks on Keccak-224 and Keccak-256. (English) Zbl 1312.94044

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 442-461 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Unaligned rebound attack: application to Keccak. (English) Zbl 1312.94046

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 402-421 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Bicliques for preimages: attacks on Skein-512 and the SHA-2 family. (English) Zbl 1282.94049

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 244-263 (2012).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Improved rebound attack on the finalist Grøstl. (English) Zbl 1312.94062

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 110-126 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Improved integral analysis on tweaked Lesamnta. (English) Zbl 1301.94127

Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 1-17 (2012).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

SHA-3 on ARM11 processors. (English) Zbl 1291.94151

Mitrokotsa, Aikaterini (ed.) et al., Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). Lecture Notes in Computer Science 7374, 324-341 (2012).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

The GLUON family: a lightweight hash function family based on FCSRs. (English) Zbl 1291.94057

Mitrokotsa, Aikaterini (ed.) et al., Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). Lecture Notes in Computer Science 7374, 306-323 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Security analysis and comparison of the SHA-3 finalists BLAKE, Grøstl, JH, Keccak, and Skein. (English) Zbl 1291.94046

Mitrokotsa, Aikaterini (ed.) et al., Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). Lecture Notes in Computer Science 7374, 287-305 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Boomerang attacks on hash function using auxiliary differentials. (English) Zbl 1292.94099

Dunkelman, Orr (ed.), Topics in cryptology – CT-RSA 2012. The cryptographers’ track at the RSA conference 2012, San Francisco, CA, USA, February 27–March 2, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-27953-9/pbk). Lecture Notes in Computer Science 7178, 215-230 (2012).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Lightweight implementations of SHA-3 candidates on FPGAs. (English) Zbl 1291.94110

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 270-289 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Boomerang distinguisher for the SIMD-512 compression function. (English) Zbl 1291.94129

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 255-269 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Practical analysis of reduced-round Keccak. (English) Zbl 1291.94136

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 236-254 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Rebound attack on JH42. (English) Zbl 1227.94058

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 252-269 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Throughput vs. area trade-offs in high-speed architectures of five round 3 SHA-3 candidates implemented using Xilinx and Altera FPGAs. (English) Zbl 1285.94068

Preneel, Bart (ed.) et al., Cryptographic hardware and embedded systems – CHES 2011. 13th international workshop, Nara, Japan, September 28–October 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-23950-2/pbk). Lecture Notes in Computer Science 6917, 491-506 (2011).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

How to improve rebound attacks. (English) Zbl 1287.94090

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 188-205 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Hyper-Sbox view of AES-like permutations: a generalized distinguisher. (English) Zbl 1295.94158

Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 155-168 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Higher-order differential properties of Keccak and Luffa. (English) Zbl 1307.94040

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 252-269 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Practical near-collisions on the compression function of BMW. (English) Zbl 1307.94069

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 238-251 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Boomerang attacks on BLAKE-32. (English) Zbl 1307.94037

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 218-237 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Practical near-collisions and collisions on round-reduced ECHO-256 compression function. (English) Zbl 1282.94047

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 107-127 (2011).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Analysis of Reduced-SHAvite-3-256 v2. (English) Zbl 1282.94058

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 68-87 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Preimage attacks on full-ARIRANG (poster). (English) Zbl 1295.94120

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 417-422 (2011).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI

Cryptanalysis of the compression function of SIMD. (English) Zbl 1295.94162

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 157-171 (2011).
MSC:  94A60 94A62
PDF BibTeX XML Cite
Full Text: DOI Link

Linear analysis of reduced-round CubeHash. (English) Zbl 1285.94041

Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7–10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21553-7/pbk). Lecture Notes in Computer Science 6715, 462-478 (2011).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI Link

Cryptanalysis of Luffa v2 components. (English) Zbl 1293.94083

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 388-409 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Subspace distinguisher for 5/8 rounds of the ECHO-256 hash function. (English) Zbl 1293.94094

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 369-387 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Security analysis of SIMD. (English) Zbl 1293.94057

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 351-368 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Deterministic differential properties of the compression function of BMW. (English) Zbl 1293.94071

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 338-350 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

A low-area yet performant FPGA implementation of Shabal. (English) Zbl 1290.94062

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 99-113 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256. (English) Zbl 1290.94048

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 1-17 (2011).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Security reductions of the second round SHA-3 candidates. (English) Zbl 1371.94619

Burmester, Mike (ed.) et al., Information security. 13th international conference, ISC 2010, Boca Raton, FL, USA, October 25–28, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-18177-1/pbk). Lecture Notes in Computer Science 6531, 39-53 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Improved collision attacks on the reduced-round Grøstl hash function. (English) Zbl 1371.94642

Burmester, Mike (ed.) et al., Information security. 13th international conference, ISC 2010, Boca Raton, FL, USA, October 25–28, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-18177-1/pbk). Lecture Notes in Computer Science 6531, 1-16 (2011).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Near-collisions on the reduced-round compression functions of Skein and BLAKE. (English) Zbl 1294.94081

Heng, Swee-Huay (ed.) et al., Cryptology and network security. 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12–14, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17618-0/pbk). Lecture Notes in Computer Science 6467, 124-139 (2010).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Integral distinguishers of some SHA-3 candidates. (English) Zbl 1294.94066

Heng, Swee-Huay (ed.) et al., Cryptology and network security. 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12–14, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17618-0/pbk). Lecture Notes in Computer Science 6467, 106-123 (2010).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Near-collisions for the reduced round versions of some second round SHA-3 compression functions using hill climbing. (English) Zbl 1253.94068

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 131-143 (2010).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Cryptographic hash functions: theory and practice. (English) Zbl 1253.94065

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 115-117 (2010).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl. (English) Zbl 1253.94067

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 38-55 (2010).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Distinguishers for the compression function and output transformation of Hamsi-256. (English) Zbl 1323.94098

Steinfeld, Ron (ed.) et al., Information security and privacy. 15th Australasian conference, ACISP 2010, Sydney, Australia, July 5–7, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14080-8/pbk). Lecture Notes in Computer Science 6168, 87-103 (2010).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI Link

Message recovery and pseudo-preimage attacks on the compression function of Hamsi-256. (English) Zbl 1285.94045

Abdalla, Michel (ed.) et al., Progress in cryptology – LATINCRYPT 2010. First international conference on cryptology and information security in Latin America, Puebla, Mexico, August 8–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14711-1/pbk). Lecture Notes in Computer Science 6212, 205-221 (2010).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Performance analysis of the SHA-3 candidates on exotic multi-core architectures. (English) Zbl 1297.94054

Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 279-293 (2010).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Fair and comprehensive methodology for comparing hardware performance of fourteen round two SHA-3 candidates using FPGAs. (English) Zbl 1297.94068

Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 264-278 (2010).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Side-channel analysis of six SHA-3 candidates. (English) Zbl 1297.94048

Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 140-157 (2010).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Differential and invertibility properties of BLAKE. (English) Zbl 1279.94052

Hong, Seokhie (ed.) et al., Fast software encryption. 17th international workshop, FSE 2010, Seoul, Korea, February 7–10, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-13857-7/pbk). Lecture Notes in Computer Science 6147, 318-332 (2010).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Pseudo-cryptanalysis of the original Blue Midnight Wish. (English) Zbl 1279.94120

Hong, Seokhie (ed.) et al., Fast software encryption. 17th international workshop, FSE 2010, Seoul, Korea, February 7–10, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-13857-7/pbk). Lecture Notes in Computer Science 6147, 304-317 (2010).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Security analysis of the mode of JH hash function. (English) Zbl 1279.94132

Hong, Seokhie (ed.) et al., Fast software encryption. 17th international workshop, FSE 2010, Seoul, Korea, February 7–10, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-13857-7/pbk). Lecture Notes in Computer Science 6147, 168-191 (2010).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Cryptanalysis of ESSENCE. (English) Zbl 1279.94106

Hong, Seokhie (ed.) et al., Fast software encryption. 17th international workshop, FSE 2010, Seoul, Korea, February 7–10, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-13857-7/pbk). Lecture Notes in Computer Science 6147, 134-152 (2010).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Improved linear differential attacks on CubeHash. (English) Zbl 1284.94083

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 407-418 (2010).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Practical key recovery attack against secret-IV Edon-\(\mathcal R\). (English) Zbl 1274.94091

Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 334-349 (2010).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

A distinguisher for the compression function of SIMD-512. (English) Zbl 1252.94087

Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 219-232 (2009).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Second preimage attack on SHAMATA-512. (English) Zbl 1252.94076

Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 169-181 (2009).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

FSBday: implementing Wagner’s generalized birthday attack against the SHA-3 round-1 candidate FSB. (English) Zbl 1248.94055

Roy, Bimal (ed.) et al., Progress in cryptology – INDOCRYPT 2009. 10th international conference on cryptology in India, New Delhi, India, December 13–16, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10627-9/pbk). Lecture Notes in Computer Science 5922, 18-38 (2009).
MSC:  94A60 68W10 68W15
PDF BibTeX XML Cite
Full Text: DOI

Linearization framework for collision attacks: application to CubeHash and MD6. (English) Zbl 1267.94044

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 560-577 (2009).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Rebound attack on the full Lane compression function. (English) Zbl 1267.94083

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 106-125 (2009).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Cryptanalysis of dynamic SHA(2). (English) Zbl 1267.94035

Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 415-432 (2009).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Cryptanalysis of the LANE hash function. (English) Zbl 1267.94103

Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 126-140 (2009).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Cryptanalysis of hash functions with structures. (English) Zbl 1267.94074

Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 108-125 (2009).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Practical collisions for SHAMATA-256. (English) Zbl 1267.94066

Jacobson, Michael J. jun. (ed.) et al., Selected areas in cryptography. 16th annual international workshop, SAC 2009, Calgary, Alberta, Canada, August 13–14, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-05443-3/pbk). Lecture Notes in Computer Science 5867, 1-15 (2009).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

On free-start collisions and collisions for TIB3. (English) Zbl 1307.94075

Samarati, Pierangela (ed.) et al., Information security. 12th international conference, ISC 2009, Pisa, Italy, September 7–9, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04473-1/pbk). Lecture Notes in Computer Science 5735, 95-106 (2009).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI Link

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Year of Publication

all top 3

Classification

all top 3

Software