Sciweavers

506 search results - page 2 / 102
» The Block Cipher Square
Sort
View
CTRSA
2009
Springer
235views Cryptology» more  CTRSA 2009»
13 years 11 months ago
A Statistical Saturation Attack against the Block Cipher PRESENT
In this paper, we present a statistical saturation attack that combines previously introduced cryptanalysis techniques against block ciphers. As the name suggests, the attack is st...
Baudoin Collard, François-Xavier Standaert
FSE
2005
Springer
106views Cryptology» more  FSE 2005»
13 years 10 months ago
New Applications of T-Functions in Block Ciphers and Hash Functions
A T-function is a mapping from n-bit words to n-bit words in which for each 0 ≤ i < n, bit i of any output word can depend only on bits 0, 1, . . . , i of any input word. All ...
Alexander Klimov, Adi Shamir
CORR
2008
Springer
81views Education» more  CORR 2008»
13 years 5 months ago
A New Type of Cipher: DICING_csb
: In this paper, we will propose a new type of cipher named DICING_CSB, which come from our previous a synchronous stream cipher DICING. It applies a stream of subkeys and a encryp...
Li an-Ping
CCS
2007
ACM
13 years 11 months ago
Elastic block ciphers: the basic design
We introduce the concept of an elastic block cipher, which refers to stretching the supported block size of a block cipher to any length up to twice the original block size while ...
Debra L. Cook, Angelos D. Keromytis, Moti Yung
FSE
1993
Springer
148views Cryptology» more  FSE 1993»
13 years 9 months ago
Design Principles for Dedicated Hash Functions
Abstract. Dedicated hash functions are cryptographically secure compression functions which are designed specifically for hashing. They intend to form a practical alternative for ...
Bart Preneel