×

Found 126 Documents (Results 1–100)

NNBits: bit profiling with a deep learning ensemble based distinguisher. (English) Zbl 07745617

Rosulek, Mike (ed.), Topics in cryptology – CT-RSA 2023. Cryptographers’ track at the RSA conference 2023, San Francisco, CA, USA, April 24–27, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13871, 493-523 (2023).
MSC:  68P25 68T07 94A60
PDFBibTeX XMLCite
Full Text: DOI

Rotational-XOR differential rectangle cryptanalysis on Simon-like ciphers. (English) Zbl 1522.94050

Rosulek, Mike (ed.), Topics in cryptology – CT-RSA 2023. Cryptographers’ track at the RSA conference 2023, San Francisco, CA, USA, April 24–27, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13871, 305-330 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Enhancing differential-neural cryptanalysis. (English) Zbl 1519.94045

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13791, 318-347 (2023).
MSC:  94A60 68P25 68T05
PDFBibTeX XMLCite
Full Text: DOI

Impossible differential cryptanalysis on reduced-round PRINCEcore. (English) Zbl 07730571

Seo, Seung-Hyun (ed.) et al., Information security and cryptology – ICISC 2022. 25th international conference, ICISC 2022, Seoul, South Korea, November 30 – December 2, 2022. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13849, 61-77 (2023).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Truncated differential properties of the diagonal set of inputs for 5-round AES. (English) Zbl 1527.94043

Nguyen, Khoa (ed.) et al., Information security and privacy. 27th Australasian conference, ACISP 2022, Wollongong, NSW, Australia, November 28–30, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13494, 24-45 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A greater GIFT: strengthening GIFT against statistical cryptanalysis. (English) Zbl 1496.94065

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13277, 115-144 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Strong and tight security guarantees against integral distinguishers. (English) Zbl 1514.94099

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 362-391 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Persistent fault analysis with few encryptions. (English) Zbl 1504.94114

Bertoni, Guido Marco (ed.) et al., Constructive side-channel analysis and secure design. 11th international workshop, COSADE 2020, Lugano, Switzerland, April 1–3, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12244, 3-24 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Weak-key distinguishers for AES. (English) Zbl 1485.94089

Dunkelman, Orr (ed.) et al., Selected areas in cryptography. 27th international conference, Halifax, NS, Canada (virtual event), October 21–23, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12804, 141-170 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions. (English) Zbl 1511.94100

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 33-63 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis results on spook. Bringing full-round shadow-512 to the light. (English) Zbl 1504.94132

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 359-388 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New results on the SymSum distinguisher on round-reduced SHA3. (English) Zbl 1501.94056

Nitaj, Abderrahmane (ed.) et al., Progress in cryptology – AFRICACRYPT 2020. 12th international conference on cryptology in Africa, Cairo, Egypt, July 20–22, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12174, 132-151 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Mixture integral attacks on reduced-round AES with a known/secret S-box. (English) Zbl 1492.94116

Bhargavan, Karthikeyan (ed.) et al., Progress in cryptology – INDOCRYPT 2020. 21st international conference on cryptology in India, Bangalore, India, December 13–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12578, 312-331 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

MILP-aided method of searching division property using three subsets and applications. (English) Zbl 1455.94197

Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11923, 398-427 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical attacks on reduced-round AES. (English) Zbl 1454.94047

Buchmann, Johannes (ed.) et al., Progress in cryptology – AFRICACRYPT 2019. 11th international conference on cryptology in Africa, Rabat, Morocco, July 9–11, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11627, 297-310 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Recovering short secret keys of RLCE in polynomial time. (English) Zbl 1509.94080

Ding, Jintai (ed.) et al., Post-quantum cryptography. 10th international conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11505, 133-152 (2019).
MSC:  94A60 94B05 81P94
PDFBibTeX XMLCite
Full Text: DOI arXiv

Several MILP-aided attacks against SNOW 2.0. (English) Zbl 1518.94063

Camenisch, Jan (ed.) et al., Cryptology and network security. 17th international conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11124, 394-413 (2018).
MSC:  94A60 94A55
PDFBibTeX XMLCite
Full Text: DOI

Confused yet successful: theoretical comparison of distinguishers for monobit leakages in terms of confusion coefficient and SNR. (English) Zbl 1509.94084

Guo, Fuchun (ed.) et al., Information security and cryptology. 14th international conference, Inscrypt 2018, Fuzhou, China, December 14–17, 2018, Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11449, 533-553 (2018).
MSC:  94A60 94A40
PDFBibTeX XMLCite
Full Text: DOI

Leakage-resilient riffle shuffle. (English) Zbl 1498.60046

Blömer, Johannes (ed.) et al., Mathematical aspects of computer and information sciences. 7th international conference, MACIS 2017, Vienna, Austria, November 15–17, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10693, 395-408 (2017).
MSC:  60C05 94A60
PDFBibTeX XMLCite
Full Text: DOI

Yoyo tricks with AES. (English) Zbl 1420.94094

Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10624, 217-243 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new structural-differential property of 5-round AES. (English) Zbl 1415.94433

Coron, Jean-Sébastien (ed.) et al., Advances in cryptology – EUROCRYPT 2017. 36th annual international conference on the theory and applications of cryptographic techniques, Paris, France, April 30 – May 4, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10211, 289-317 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Some proofs of joint distributions of keystream biases in RC4. (English) Zbl 1411.94069

Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 305-321 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Higher-order cryptanalysis of LowMC. (English) Zbl 1384.94056

Kwon, Soonhak (ed.) et al., Information security and cryptology – ICISC 2015. 18th international conference, Seoul, South Korea, November 25–27, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-30839-5/pbk; 978-3-319-30840-1/ebook). Lecture Notes in Computer Science 9558, 87-101 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A heuristic approach to assist side channel analysis of the data encryption standard. (English) Zbl 1405.94053

Ryan, Peter Y. A. (ed.) et al., The new codebreakers. Essays dedicated to David Kahn on the occasion of his 85th birthday. Berlin: Springer (ISBN 978-3-662-49300-7/pbk; 978-3-662-49301-4/ebook). Lecture Notes in Computer Science 9100, 355-373 (2016).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

A key to success. Success exponents for side-channel distinguishers. (English) Zbl 1377.94051

Biryukov, Alex (ed.) et al., Progress in cryptology – INDOCRYPT 2015. 16th international conference on cryptology in India, Bangalore, India, December 6–9, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26616-9/pbk; 978-3-319-26617-6/ebook). Lecture Notes in Computer Science 9462, 270-290 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Structural evaluation for generalized Feistel structures and applications to LBlock and TWINE. (English) Zbl 1377.94070

Biryukov, Alex (ed.) et al., Progress in cryptology – INDOCRYPT 2015. 16th international conference on cryptology in India, Bangalore, India, December 6–9, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26616-9/pbk; 978-3-319-26617-6/ebook). Lecture Notes in Computer Science 9462, 218-237 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Known-key distinguisher on full \(\mathtt{PRESENT}\). (English) Zbl 1375.94104

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 455-474 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Structural evaluation by generalized integral property. (English) Zbl 1370.94545

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 287-314 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Square code attack on a modified Sidelnikov cryptosystem. (English) Zbl 1441.94091

El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer. Lect. Notes Comput. Sci. 9084, 173-183 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Internal differential boomerangs: practical analysis of the round-reduced Keccak-\(f\). (English) Zbl 1382.94124

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 537-556 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linear distinguishers in the key-less setting: application to PRESENT. (English) Zbl 1367.94323

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 217-240 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A polynomial-time attack on the BBCRS scheme. (English) Zbl 1345.94054

Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 175-193 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Practical cryptanalysis of PAES. (English) Zbl 1382.94125

Joux, Antoine (ed.) et al., Selected areas in cryptography – SAC 2014. 21st international conference, Montreal, QC, Canada, August 14–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 228-242 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A theoretical study of Kolmogorov-Smirnov distinguishers. (English) Zbl 1440.94056

Prouff, Emmanuel (ed.), Constructive side-channel analysis and secure design. 5th international workshop, COSADE 2014, Paris, France, April 13–15, 2014. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 8622, 9-28 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Multivariate leakage model for improving non-profiling DPA on noisy power traces. (English) Zbl 1347.94036

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 325-342 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Integral based fault attack on LBlock. (English) Zbl 1352.94030

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 227-240 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

General model of the single-key meet-in-the-middle distinguisher on the word-oriented block cipher. (English) Zbl 1368.94113

Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, Korea, November 27–29, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12159-8/pbk; 978-3-319-12160-4/ebook). Lecture Notes in Computer Science 8565, 203-223 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linear cryptanalysis of FASER128/256 and TriviA-ck. (English) Zbl 1337.94081

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 237-254 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Good is not good enough. Deriving optimal distinguishers from communication theory. (English) Zbl 1383.94003

Batina, Lejla (ed.) et al., Cryptographic hardware and embedded systems – CHES 2014. 16th international workshop, Busan, South Korea, September 23–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-662-44708-6/pbk). Lecture Notes in Computer Science 8731, 55-74 (2014).
MSC:  94A05 94A60
PDFBibTeX XMLCite
Full Text: DOI

Masks will fall off. Higher-order optimal distinguishers. (English) Zbl 1317.94090

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 344-365 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Differential cryptanalysis and linear distinguisher of full-round zorro. (English) Zbl 1353.94077

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 308-323 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved cryptanalysis on reduced-round GOST and Whirlpool hash function. (English) Zbl 1314.94088

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 289-307 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications. (English) Zbl 1353.94072

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 253-270 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical distinguishers against 6-round Keccak-\(f\) exploiting self-symmetry. (English) Zbl 1288.94066

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 88-108 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security analysis of GFN: 8-round distinguisher for 4-branch type-2 GFN. (English) Zbl 1295.94033

Paul, Goutam (ed.) et al., Progress in cryptology – INDOCRYPT 2013. 14th international conference on cryptology in India, Mumbai, India, December 7–10, 2013. Proceedings. Berlin: Springer (ISBN 978-3-319-03514-7/pbk). Lecture Notes in Computer Science 8250, 136-148 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful. (English) Zbl 1314.94076

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 504-523 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

New results on generalization of Roos-type biases and related keystreams of RC4. (English) Zbl 1312.94076

Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 222-239 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved key recovery attacks on reduced-round Salsa20 and ChaCha. (English) Zbl 1342.94096

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 337-351 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of full RIPEMD-128. (English) Zbl 1306.94068

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 228-244 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Double-SP is weaker than single-SP: rebound attacks on Feistel ciphers with several rounds. (English) Zbl 1295.94141

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 265-282 (2012).
MSC:  94A60 68M10
PDFBibTeX XMLCite
Full Text: DOI

Faster chosen-key distinguishers on reduced-round AES. (English) Zbl 1295.94051

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 225-243 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Generic related-key attacks for HMAC. (English) Zbl 1292.94128

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 580-597 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved integral analysis on tweaked Lesamnta. (English) Zbl 1301.94127

Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 1-17 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of TWIS block cipher. (English) Zbl 1304.94070

Armknecht, Frederik (ed.) et al., Research in cryptology. 4th Western European workshop, WEWoRC 2011, Weimar, Germany, July 20–22, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34158-8/pbk). Lecture Notes in Computer Science 7242, 109-121 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers. (English) Zbl 1319.94087

Bao, Feng (ed.) et al., Applied cryptography and network security. 10th international conference, ACNS 2012, Singapore, June 26–29, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31283-0/pbk). Lecture Notes in Computer Science 7341, 117-134 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Analysis of Xorrotation with application to an HC-128 variant. (English) Zbl 1308.94092

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 419-425 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Practical attack on the full MMB block cipher. (English) Zbl 1292.94086

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 185-199 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved analysis of ECHO-256. (English) Zbl 1292.94084

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 19-36 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL. (English) Zbl 1279.94114

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 1-18 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software