Sciweavers

29 search results - page 5 / 6
» fse 2004
Sort
View
FSE
2004
Springer
115views Cryptology» more  FSE 2004»
13 years 10 months ago
Correlation Attacks Using a New Class of Weak Feedback Polynomials
In 1985 Siegenthaler introduced the concept of correlation attacks on LFSR based stream ciphers. A few years later Meier and Staffelbach demonstrated a special technique, usually ...
Håkan Englund, Martin Hell, Thomas Johansson
FSE
2004
Springer
109views Cryptology» more  FSE 2004»
13 years 9 months ago
On the Additive Differential Probability of Exclusive-Or
We study the differential probability adp of exclusive-or when differences are expressed using addition modulo 2N . This function is important when analysing symmetric primitives t...
Helger Lipmaa, Johan Wallén, Philippe Dumas
FSE
2005
Springer
118views Cryptology» more  FSE 2005»
13 years 10 months ago
Preimage and Collision Attacks on MD2
This paper contains several attacks on the hash function MD2 which has a hash code size of 128 bits. At Asiacrypt 2004 Muller presents the first known preimage attack on MD2. The ...
Lars R. Knudsen, John Erik Mathiassen
FSE
2006
Springer
159views Cryptology» more  FSE 2006»
13 years 9 months ago
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions
The security of hash functions has recently become one of the hottest topics in the design and analysis of cryptographic primitives. Since almost all the hash functions used today ...
Jonathan J. Hoch, Adi Shamir
FSE
2006
Springer
116views Cryptology» more  FSE 2006»
13 years 9 months ago
On Feistel Structures Using a Diffusion Switching Mechanism
We study a recently proposed design approach of Feistel structure which employs diffusion matrices in a switching way. At ASIACRYPT 2004, Shirai and Preneel have proved that large ...
Taizo Shirai, Kyoji Shibutani