Sciweavers

15 search results - page 2 / 3
» Cryptanalysis of Reduced-Round Whirlwind
Sort
View
CANS
2010
Springer
258views Cryptology» more  CANS 2010»
13 years 4 months ago
Cryptanalysis of Reduced-Round MIBS Block Cipher
Abstract. This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at ...
Asli Bay, Jorge Nakahara, Serge Vaudenay
WEWORC
2007
148views Cryptology» more  WEWORC 2007»
13 years 7 months ago
Preimages for Reduced-Round Tiger
The cryptanalysis of the cryptographic hash function Tiger has, until now, focussed on finding collisions. In this paper we describe a preimage attack on the compression function ...
Sebastiaan Indesteege, Bart Preneel
ACNS
2011
Springer
254views Cryptology» more  ACNS 2011»
12 years 9 months ago
Linear Analysis of Reduced-Round CubeHash
Abstract. Recent developments in the field of cryptanalysis of hash functions has inspired NIST to announce a competition for selecting a new cryptographic hash function to join t...
Tomer Ashur, Orr Dunkelman
CISC
2007
Springer
125views Cryptology» more  CISC 2007»
14 years 7 days ago
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent
Abstract. This paper reports on the improved and multiple linear cryptanalysis of reduced round Serpent by mean of a branch-and-bound characteristic search within the algorithm. We...
Baudoin Collard, François-Xavier Standaert,...
ACNS
2008
Springer
107views Cryptology» more  ACNS 2008»
14 years 12 days ago
Attacking Reduced Round SHA-256
The SHA-256 hash function has started getting attention recently by the cryptanalysis community
Somitra Kumar Sanadhya, Palash Sarkar