Sciweavers

Share
6 search results - page 1 / 2
» Improved Cryptanalysis of the Self-Shrinking Generator
Sort
View
ACISP
2001
Springer
10 years 6 months ago
Improved Cryptanalysis of the Self-Shrinking Generator
Erik Zenner, Matthias Krause, Stefan Lucks
IACR
2011
182views more  IACR 2011»
9 years 1 months ago
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
Abstract. In this paper, we analyze the security of AZUMI protocol which is compliant with the EPCClass-1 Generation-2 standard and recently has been proposed by Peris et al. This ...
Masoumeh Safkhani, Nasour Bagheri, Majid Naderi
SACRYPT
1998
Springer
257views Cryptology» more  SACRYPT 1998»
10 years 5 months ago
Cryptanalysis of RC4-like Ciphers
Abstract. RC4, a stream cipher designed by Rivest for RSA Data Security Inc., has found several commercial applications, but little public analysis has been done to date. In this p...
Serge Mister, Stafford E. Tavares
CQRE
1999
Springer
10 years 5 months ago
Cryptanalysis of Microsoft's PPTP Authentication Extensions (MS-CHAPv2)
The Point-to-Point Tunneling Protocol (PPTP) is used to secure PPP connections over TCP/IP link. In response to [SM98], Microsoft released extensions to the PPTP authentication me...
Bruce Schneier, Mudge, David Wagner
CORR
2006
Springer
111views Education» more  CORR 2006»
10 years 1 months ago
Length-based cryptanalysis: The case of Thompson's Group
The length-based approach is a heuristic for solving randomly generated equations in groups which possess a reasonably behaved length function. We describe several improvements of ...
Dima Ruinskiy, Adi Shamir, Boaz Tsaban
books