Sciweavers

74 search results - page 2 / 15
» A Key Recovery Attack on Edon80
Sort
View
ASIACRYPT
2011
Springer
12 years 5 months ago
Biclique Cryptanalysis of the Full AES
Since Rijndael was chosen as the Advanced Encryption Standard, improving upon 7-round attacks on the 128-bit key variant or upon 8-round attacks on the 192/256-bit key variants has...
Andrey Bogdanov, Dmitry Khovratovich, Christian Re...
IACR
2011
85views more  IACR 2011»
12 years 5 months ago
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
The hardware-attractive block cipher family KTANTAN was studied by Bogdanov and Rechberger who identified flaws in the key schedule and gave a meet-in-the-middle attack. We revis...
Martin Ågren
CSI
2004
110views more  CSI 2004»
13 years 5 months ago
A novel three-party encrypted key exchange protocol
The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, henc...
Chin-Chen Chang, Ya-Fen Chang
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
12 years 9 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
ISW
1997
Springer
13 years 9 months ago
Cryptanalysis of Message Authentication Codes
This paper gives a survey of attacks on Message Authentication Codes (MACs). First it defines the required security properties. Next it describes generic forgery and key recovery...
Bart Preneel