Sciweavers

FSE
1998
Springer
94views Cryptology» more  FSE 1998»
13 years 9 months ago
CS-Cipher
In this paper we describe our new CS2 block cipher which is an extension of the original CS-Cipher. Our new design inherits the efficiency of the original design while being upgrad...
Jacques Stern, Serge Vaudenay
FSE
1998
Springer
137views Cryptology» more  FSE 1998»
13 years 9 months ago
Differential Cryptanalysis of the ICE Encryption Algorithm
ICE is a 64-bit block cipher presented at the Fast Software Encryption Workshop in January 1997. It introduced the concept of a keyed permutation to improve the resistance against ...
Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen
FSE
1998
Springer
79views Cryptology» more  FSE 1998»
13 years 9 months ago
On the Design and Security of RC2
The block cipher RC2 was designed in 1989 by Ron Rivest for RSA Data Security Inc. In this paper we describe both the cipher and preliminary attempts to use both differential and l...
Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest,...
FSE
1998
Springer
102views Cryptology» more  FSE 1998»
13 years 9 months ago
Cryptanalytic Attacks on Pseudorandom Number Generators
In this paper we discuss PRNGs: the mechanisms used by real-world secure systems to generate cryptographic keys, initialization vectors, "random" nonces, and other values...
John Kelsey, Bruce Schneier, David Wagner, Chris H...
FSE
1998
Springer
98views Cryptology» more  FSE 1998»
13 years 9 months ago
JEROBOAM
Hervé Chabanne, Emmanuel Michon
FSE
1998
Springer
131views Cryptology» more  FSE 1998»
13 years 9 months ago
Cryptanalysis of TWOPRIME
Ding et al [DNRS97] propose a stream generator based on several layers. We present several attacks. First, we observe that the non-surjectivity of a linear combination step allows ...
Don Coppersmith, David Wagner, Bruce Schneier, Joh...