Sciweavers

7 search results - page 1 / 2
» Attack on Six Rounds of Crypton
Sort
View
FSE
1999
Springer
87views Cryptology» more  FSE 1999»
13 years 9 months ago
Attack on Six Rounds of Crypton
Abstract. In this paper we present an attack on a reduced round version of Crypton. The attack is based on the dedicated Square attack. We explain why the attack also works on Cryp...
Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart...
FSE
2000
Springer
80views Cryptology» more  FSE 2000»
13 years 8 months ago
Stochastic Cryptanalysis of Crypton
Abstract. Crypton is a 12-round blockcipher proposed as an AES candidate by C.H. Lim in 1998. In this paper, we show how to exploit some statistical deficiencies of the Crypton rou...
Marine Minier, Henri Gilbert
CHES
2010
Springer
175views Cryptology» more  CHES 2010»
13 years 6 months ago
Side-Channel Analysis of Six SHA-3 Candidates
Abstract. In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choic...
Olivier Benoît, Thomas Peyrin
EUROCRYPT
2001
Springer
13 years 9 months ago
Cryptanalysis of Reduced-Round MISTY
Abstract. The block ciphers MISTY1 and MISTY2 proposed by Matsui are based on the principle of provable security against differential and linear cryptanalysis. This paper presents...
Ulrich Kühn
FSE
1997
Springer
210views Cryptology» more  FSE 1997»
13 years 9 months ago
Partitioning Cryptanalysis
Matsui's linear cryptanalysis for iterated block ciphers is generalized to an attack called. This attack exploits a weakness that can be described by an e ective partition-pa...
Carlo Harpes, James L. Massey