Sciweavers

FSE
2000
Springer
96views Cryptology» more  FSE 2000»
13 years 8 months ago
On the Interpolation Attacks on Block Ciphers
Abstract. The complexity of interpolation attacks on block ciphers depends on the degree of the polynomial approximation and or on the number of terms in the polynomial approximati...
Amr M. Youssef, Guang Gong
FSE
2000
Springer
142views Cryptology» more  FSE 2000»
13 years 8 months ago
Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family
Abstract. This paper presents a linear cryptanalytic attack against reduced round variants of the SAFER family of block ciphers. Compared
Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle
FSE
2000
Springer
80views Cryptology» more  FSE 2000»
13 years 8 months ago
Stochastic Cryptanalysis of Crypton
Abstract. Crypton is a 12-round blockcipher proposed as an AES candidate by C.H. Lim in 1998. In this paper, we show how to exploit some statistical deficiencies of the Crypton rou...
Marine Minier, Henri Gilbert
FSE
2000
Springer
107views Cryptology» more  FSE 2000»
13 years 8 months ago
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent
Abstract. We introduce a new cryptanalytic technique based on Wagner's boomerang and inside-out attacks. We first describe this new attack in terms of the original boomerang a...
John Kelsey, Tadayoshi Kohno, Bruce Schneier
FSE
2000
Springer
128views Cryptology» more  FSE 2000»
13 years 8 months ago
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators
This paper presents an operational reconstruction technique of most stream ciphers. We primarily expose it for key-stream generators which consist of several linear feedback shift ...
Anne Canteaut, Eric Filiol
FSE
2000
Springer
91views Cryptology» more  FSE 2000»
13 years 8 months ago
A Statistical Attack on RC6
This paper details the attack on RC6 which was announced in a report published in the proceedings of the second AES candidate conference (March 1999). Based on an observation on th...
Henri Gilbert, Helena Handschuh, Antoine Joux, Ser...
FSE
2000
Springer
111views Cryptology» more  FSE 2000»
13 years 8 months ago
Real Time Cryptanalysis of A5/1 on a PC
Alex Biryukov, Adi Shamir, David Wagner
FSE
2000
Springer
101views Cryptology» more  FSE 2000»
13 years 8 months ago
Improved Cryptanalysis of Rijndael
We improve the best attack on Rijndael reduced to 6 rounds from complexity 272 to 244 . We also present the first known attacks on 7- and 8-round Rijndael. The attacks on 8-round R...
Niels Ferguson, John Kelsey, Stefan Lucks, Bruce S...
FSE
2000
Springer
153views Cryptology» more  FSE 2000»
13 years 8 months ago
Bitslice Ciphers and Power Analysis Attacks
In this paper, we present techniques to protect bitslice block ciphers against power analysis attacks. We analyze and extend a technique proposed in [14]. We apply the technique to...
Joan Daemen, Michael Peeters, Gilles Van Assche