Sciweavers

Share
AFRICACRYPT
2008
Springer
9 years 1 months ago
Differential Cryptanalysis of Reduced-Round PRESENT
: In this paper, we have presented flaws in differential cryptanalysis of reduced round variant of PRESENT given by M.Wang in [3] [4] for 80 bits key length and we have shown that ...
Meiqin Wang
AFRICACRYPT
2008
Springer
9 years 1 months ago
How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?
Abstract. In the context of iterated hash functions, "dithering" designates the technique of adding an iteration-dependent input to the compression function in order to d...
Jean-Philippe Aumasson, Raphael C.-W. Phan
AFRICACRYPT
2008
Springer
9 years 1 months ago
An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol Based on Merkle Trees
Proof-of-work schemes are economic measures to deter denial-of-service attacks: service requesters compute moderately hard functions the results of which are easy to check by the ...
Fabien Coelho
AFRICACRYPT
2008
Springer
9 years 1 months ago
Yet Another Attack on Vest
Pascal Delaunay, Antoine Joux
AFRICACRYPT
2008
Springer
9 years 5 months ago
An Adaptation of the NICE Cryptosystem to Real Quadratic Orders
Abstract. In 2000, Paulus and Takagi introduced a public key cryptosystem called NICE that exploits the relationship between maximal and non-maximal orders in imaginary quadratic n...
Michael J. Jacobson Jr., Renate Scheidler, Daniel ...
AFRICACRYPT
2008
Springer
9 years 5 months ago
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
Simon Fischer 0002, Shahram Khazaei, Willi Meier
AFRICACRYPT
2008
Springer
9 years 5 months ago
An Authentication Protocol with Encrypted Biometric Data
Julien Bringer, Hervé Chabanne
AFRICACRYPT
2008
Springer
9 years 5 months ago
Analysis of Grain's Initialization Algorithm
In this paper, we analyze the initialization algorithm of Grain, one of the eSTREAM candidates which made it to the third phase of the project. We point out the existence of a slid...
Christophe De Cannière, Özgül K&u...
AFRICACRYPT
2008
Springer
9 years 5 months ago
Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds
Rijndael is a block cipher designed by V. Rijmen and J. Daemen and it was chosen in its 128-bit block version as AES by the NIST in October 2000. Three key lengths - 128, 192 or 25...
Samuel Galice, Marine Minier
books