Sciweavers

37 search results - page 3 / 8
» fse 2007
Sort
View
FSE
2007
Springer
107views Cryptology» more  FSE 2007»
13 years 11 months ago
Message Freedom in MD4 and MD5 Collisions: Application to APOP
Abstract. In Wang’s attack, message modifications allow to deterministically satisfy certain sufficient conditions to find collisions efficiently. Unfortunately, message modi...
Gaëtan Leurent
FSE
2007
Springer
142views Cryptology» more  FSE 2007»
13 years 9 months ago
A New Class of Weak Keys for Blowfish
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed points. In this paper, we describe two reflection attack...
Orhun Kara, Cevat Manap
FSE
2007
Springer
104views Cryptology» more  FSE 2007»
13 years 11 months ago
How to Enrich the Message Space of a Cipher
Abstract. Given (deterministic) ciphers E and E that can encipher messages of l and n bits, respectively, we construct a cipher E∗ = XLS[E, E] that can encipher messages of l + s...
Thomas Ristenpart, Phillip Rogaway
FSE
2007
Springer
87views Cryptology» more  FSE 2007»
13 years 11 months ago
On the Security of IV Dependent Stream Ciphers
CryptMT v3 is a stream cipher submitted to eStream project, and has entered the third evaluation phase. Any attack has not been found until now. In this paper, we mainly discuss th...
Côme Berbain, Henri Gilbert
FSE
2007
Springer
101views Cryptology» more  FSE 2007»
13 years 11 months ago
Producing Collisions for Panama, Instantaneously
We present a practical attack on the Panama hash function that generates a collision in 26 evaluations of the state updating function. Our attack improves that of Rijmen and cowork...
Joan Daemen, Gilles Van Assche