Sciweavers

14 search results - page 1 / 3
» Known-IV Attacks on Triple Modes of Operation of Block Ciphe...
Sort
View
ASIACRYPT
2001
Springer
13 years 9 months ago
Known-IV Attacks on Triple Modes of Operation of Block Ciphers
With chosen-IV chosen texts, David Wagner has analyzed the multiple modes of operation proposed by Eli Biham in FSE’98. However, his method is too unrealistic. We use only known-...
Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee...
EUROCRYPT
2003
Springer
13 years 10 months ago
Cryptanalysis of the EMD Mode of Operation
Abstract. In this paper, we study the security of the Encrypt-MaskDecrypt mode of operation, also called EMD, which was recently proposed for applications such as disk-sector encry...
Antoine Joux
FSE
1999
Springer
83views Cryptology» more  FSE 1999»
13 years 9 months ago
On the Security of Double and 2-Key Triple Modes of Operation
The DES has reached the end of its lifetime due to its too short key length and block length (56 and 64 bits respectively). As we are awaiting the new AES, triple (and double) encr...
Helena Handschuh, Bart Preneel
ICC
2009
IEEE
155views Communications» more  ICC 2009»
13 years 3 months ago
On Hashing with Tweakable Ciphers
Cryptographic hash functions are often built on block ciphers in order to reduce the security of the hash to that of the cipher, and to minimize the hardware size. Proven secure co...
Raphael Chung-Wei Phan, Jean-Philippe Aumasson