Sciweavers

FSE
2001
Springer
190views Cryptology» more  FSE 2001»
13 years 9 months ago
ZIP Attacks with Reduced Known Plaintext
Abstract. Biham and Kocher demonstrated that the PKZIP stream cipher was weak and presented an attack requiring thirteen bytes of plaintext. The deflate algorithm “zippers” no...
Michael Stay
FSE
2001
Springer
121views Cryptology» more  FSE 2001»
13 years 9 months ago
Producing Collisions for PANAMA
PANAMA is a cryptographic module that was presented at the FSE Workshop in ’98 by Joan Daemen and Craig Clapp. It can serve both as a stream cipher and as a cryptographic hash fu...
Vincent Rijmen, Bart Van Rompay, Bart Preneel, Joo...
FSE
2001
Springer
116views Cryptology» more  FSE 2001»
13 years 9 months ago
NESSIE: A European Approach to Evaluate Cryptographic Algorithms
The NESSIE project (New European Schemes for Signature, Integrity and Encryption) intends to put forward a portfolio containing the next generation of cryptographic primitives. The...
Bart Preneel
FSE
2001
Springer
85views Cryptology» more  FSE 2001»
13 years 9 months ago
New Results on the Pseudorandomness of Some Blockcipher Constructions
In this paper, we describe new results on the security, in the Luby-Rackoff paradigm, of two modified Feistel constructions, namely the L-scheme, a construction used at various l...
Henri Gilbert, Marine Minier
FSE
2001
Springer
117views Cryptology» more  FSE 2001»
13 years 9 months ago
Differential Cryptanalysis of Q
Eli Biham, Vladimir Furman, Michal Misztal, Vincen...
FSE
2001
Springer
109views Cryptology» more  FSE 2001»
13 years 9 months ago
Bias in the LEVIATHAN Stream Cipher
We show two methods of distinguishing the LEVIATHAN stream cipher from a random stream using 236 bytes of output and proportional effort; both arise from compression within the ci...
Paul Crowley, Stefan Lucks
FSE
2001
Springer
113views Cryptology» more  FSE 2001»
13 years 9 months ago
Optimized Self-Synchronizing Mode of Operation
Abstract. Modes of operation adapt block ciphers to many applications. Among the encryption modes, only CFB Cipher Feedback has both of the following properties: Firstly it allow...
Ammar Alkassar, Alexander Geraldy, Birgit Pfitzman...