Sciweavers

12 search results - page 1 / 3
» New Distinguishing Attack on MAC Using Secret-Prefix Method
Sort
View
FSE
2009
Springer
143views Cryptology» more  FSE 2009»
13 years 11 months ago
New Distinguishing Attack on MAC Using Secret-Prefix Method
Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang
FSE
2006
Springer
124views Cryptology» more  FSE 2006»
13 years 8 months ago
Improved Linear Distinguishers for SNOW 2.0
In this paper we present new and more accurate estimates of the biases of the linear approximation of the FSM of the stream cipher SNOW 2.0. Based on improved bias estimates we als...
Kaisa Nyberg, Johan Wallén
PKC
1999
Springer
211views Cryptology» more  PKC 1999»
13 years 9 months ago
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol
This paper presents some new unknown key-share attacks on STS-MAC, the version of the STS key agreement protocol which uses a MAC algorithm to provide key confirmation. Various me...
Simon Blake-Wilson, Alfred Menezes
CCS
2001
ACM
13 years 9 months ago
New Iterative Geometric Methods for Robust Perceptual Image Hashing
We propose a novel and robust hashing paradigm that uses iterative geometric techniques and relies on observations that main geometric features within an image would approximately ...
Mehmet Kivanç Mihçak, Ramarathnam Ve...
CRYPTO
2006
Springer
155views Cryptology» more  CRYPTO 2006»
13 years 8 months ago
A Method for Making Password-Based Key Exchange Resilient to Server Compromise
This paper considers the problem of password-authenticated key exchange (PAKE) in a client-server setting, where the server authenticates using a stored password file, and it is de...
Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan