Sciweavers

FSE
2005
Springer
108views Cryptology» more  FSE 2005»
13 years 10 months ago
Unbiased Random Sequences from Quasigroup String Transformations
Abstract. The need of true random number generators for many purposes (ranging from applications in cryptography and stochastic simulation, to search heuristics and game playing) i...
Smile Markovski, Danilo Gligoroski, Ljupco Kocarev
FSE
2005
Springer
118views Cryptology» more  FSE 2005»
13 years 10 months ago
Preimage and Collision Attacks on MD2
This paper contains several attacks on the hash function MD2 which has a hash code size of 128 bits. At Asiacrypt 2004 Muller presents the first known preimage attack on MD2. The ...
Lars R. Knudsen, John Erik Mathiassen
FSE
2005
Springer
113views Cryptology» more  FSE 2005»
13 years 10 months ago
SMASH - A Cryptographic Hash Function
1 This paper presents a new hash function design, which is different from the popular designs of the MD4-family. Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1, and...
Lars R. Knudsen
FSE
2005
Springer
106views Cryptology» more  FSE 2005»
13 years 10 months ago
New Applications of T-Functions in Block Ciphers and Hash Functions
A T-function is a mapping from n-bit words to n-bit words in which for each 0 ≤ i < n, bit i of any output word can depend only on bits 0, 1, . . . , i of any input word. All ...
Alexander Klimov, Adi Shamir
FSE
2005
Springer
98views Cryptology» more  FSE 2005»
13 years 10 months ago
New Attacks Against Reduced-Round Versions of IDEA
In this paper, we describe a sequence of simple, yet efficient chosen-plaintext (or chosen-ciphertext) attacks against reduced-round versions of IDEA (with 2, 2.5, 3, 3.5, and 4 ro...
Pascal Junod
FSE
2005
Springer
122views Cryptology» more  FSE 2005»
13 years 10 months ago
Analysis of the Bit-Search Generator and Sequence Compression Techniques
Abstract. Algebraic attacks on stream ciphers apply (at least theoretically) to all LFSR-based stream ciphers that are clocked in a simple and/or easily predictable way. One intere...
Aline Gouget, Hervé Sibert, Côme Berb...
FSE
2005
Springer
107views Cryptology» more  FSE 2005»
13 years 10 months ago
Small Scale Variants of the AES
In this paper we define small scale variants of the AES. These variants inherit the design features of the AES and provide a suitable framework for comparing different cryptanaly...
Carlos Cid, Sean Murphy, Matthew J. B. Robshaw
FSE
2005
Springer
85views Cryptology» more  FSE 2005»
13 years 10 months ago
Analysis of the Non-linear Part of Mugi
This paper presents the results of a preliminary analysis of the stream cipher Mugi. We study the nonlinear component of this cipher and identify several potential weaknesses in it...
Alex Biryukov, Adi Shamir
FSE
2005
Springer
87views Cryptology» more  FSE 2005»
13 years 10 months ago
Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4
Eli Biham, Louis Granboulan, Phong Q. Nguyen