Sciweavers

16 search results - page 1 / 4
» New Birthday Attacks on Some MACs Based on Block Ciphers
Sort
View
CRYPTO
2009
Springer
106views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
New Birthday Attacks on Some MACs Based on Block Ciphers
Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiao...
FSE
2003
Springer
135views Cryptology» more  FSE 2003»
13 years 10 months ago
New Attacks against Standardized MACs
In this paper, we revisit the security of several message authentication code (MAC) algorithms based on block ciphers, when instantiated with 64-bit block ciphers such as DES. We e...
Antoine Joux, Guillaume Poupard, Jacques Stern
FSE
2006
Springer
107views Cryptology» more  FSE 2006»
13 years 9 months ago
Some Plausible Constructions of Double-Block-Length Hash Functions
Abstract. In this article, it is discussed how to construct a compression function with 2n-bit output using a component function with n-bit output. The component function is either...
Shoichi Hirose
BIRTHDAY
2012
Springer
12 years 1 months ago
Masking with Randomized Look Up Tables - Towards Preventing Side-Channel Attacks of All Orders
We propose a new countermeasure to protect block ciphers implemented in leaking devices, at the intersection between One-Time Programs and Boolean masking schemes. First, we show t...
François-Xavier Standaert, Christophe Petit...
CRYPTO
1993
Springer
131views Cryptology» more  CRYPTO 1993»
13 years 9 months ago
Hash Functions Based on Block Ciphers: A Synthetic Approach
Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length of the block cipher and where the key size is appro...
Bart Preneel, René Govaerts, Joos Vandewall...