Sciweavers

11 search results - page 2 / 3
» fse 1999
Sort
View
FSE
1999
Springer
87views Cryptology» more  FSE 1999»
13 years 9 months ago
Attack on Six Rounds of Crypton
Abstract. In this paper we present an attack on a reduced round version of Crypton. The attack is based on the dedicated Square attack. We explain why the attack also works on Cryp...
Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart...
FSE
1999
Springer
94views Cryptology» more  FSE 1999»
13 years 9 months ago
On the Construction of Variable-Input-Length Ciphers
Whereas a block cipher enciphers messages of some one particular length the blocklength, a variable-input-length cipher takes messages of varying and preferably arbitrary leng...
Mihir Bellare, Phillip Rogaway
FSE
1999
Springer
83views Cryptology» more  FSE 1999»
13 years 9 months ago
On the Security of Double and 2-Key Triple Modes of Operation
The DES has reached the end of its lifetime due to its too short key length and block length (56 and 64 bits respectively). As we are awaiting the new AES, triple (and double) encr...
Helena Handschuh, Bart Preneel
FSE
1999
Springer
137views Cryptology» more  FSE 1999»
13 years 9 months ago
Linear Cryptanalysis of RC5 and RC6
In this paper we evaluate the resistance of the block cipher RC5 against linear cryptanalysis. We describe a known plaintext attack that can break RC5-32 (blocksize 64) with 10 rou...
Johan Borst, Bart Preneel, Joos Vandewalle
FSE
1999
Springer
101views Cryptology» more  FSE 1999»
13 years 9 months ago
Mod n Cryptanalysis, with Applications Against RC5P and M6
We introduce “mod n cryptanalysis,” a form of partitioning attack that is effective against ciphers which rely on modular addition and bit rotations for their security. We dem...
John Kelsey, Bruce Schneier, David Wagner