Sciweavers

74 search results - page 1 / 15
» A Key Recovery Attack on Edon80
Sort
View
ASIACRYPT
2007
Springer
13 years 11 months ago
A Key Recovery Attack on Edon80
Edon80 is a recent stream cipher design that has advanced to the third and last phase of the eSTREAM project. It has remained unbroken and untweaked since it was designed and submi...
Martin Hell, Thomas Johansson
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
13 years 6 months ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel
EUROCRYPT
2008
Springer
13 years 6 months ago
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Lei Wang, Kazuo Ohta, Noboru Kunihiro
CRYPTO
2000
Springer
123views Cryptology» more  CRYPTO 2000»
13 years 9 months ago
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
Abstract. We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. Unlike previous attacks, th...
Don Coppersmith, Lars R. Knudsen, Chris J. Mitchel...