Sciweavers

123 search results - page 2 / 25
» Cryptanalysis of 2R- Schemes
Sort
View
IPL
2006
65views more  IPL 2006»
13 years 5 months ago
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme
We propose cryptanalysis of the First Domingo-Ferrer's algebraic privacy homomorphism E : Zn (Zp
Jung Hee Cheon, Woo-Hwan Kim, Hyun Soo Nam
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
13 years 11 months ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
CHES
2010
Springer
175views Cryptology» more  CHES 2010»
13 years 6 months ago
Side-Channel Analysis of Six SHA-3 Candidates
Abstract. In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choic...
Olivier Benoît, Thomas Peyrin
IACR
2011
207views more  IACR 2011»
12 years 5 months ago
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Tw
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...
Swapnoneel Roy, Amlan K. Das, Yu Li
FSE
2010
Springer
220views Cryptology» more  FSE 2010»
13 years 10 months ago
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
In this paper, we improve the recent rebound and start-from-the-middle attacks on AES-like permutations. Our new cryptanalysis technique uses the fact that one can view two rounds ...
Henri Gilbert, Thomas Peyrin