Sciweavers

FSE
2004
Springer
108views Cryptology» more  FSE 2004»
13 years 10 months ago
Algebraic Attacks on Summation Generators
We apply the algebraic attacks on stream ciphers with memories to the summation generator. For a summation generator that uses n LFSRs, an algebraic equation relating the key strea...
Dong Hoon Lee 0002, Jaeheon Kim, Jin Hong, Jae Woo...
FSE
2004
Springer
117views Cryptology» more  FSE 2004»
13 years 10 months ago
CWC: A High-Performance Conventional Authenticated Encryption Mode
Tadayoshi Kohno, John Viega, Doug Whiting
FSE
2004
Springer
96views Cryptology» more  FSE 2004»
13 years 10 months ago
A New Stream Cipher HC-256
HC-256 is a software-efficient stream cipher. It generates keystream from a 256-bit secret key and a 256-bit initialization vector.
Hongjun Wu
FSE
2004
Springer
155views Cryptology» more  FSE 2004»
13 years 10 months ago
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering
This paper presents algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two different attacks are implemented. In the first attack, we obt...
Joo Yeon Cho, Josef Pieprzyk
FSE
2004
Springer
130views Cryptology» more  FSE 2004»
13 years 10 months ago
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
A cryptanalysis is given of a MAC proposal presented at CRYPTO 2003 by Cary and Venkatesan. A nice feature of the CaryVenkatesan MAC is that a lower bound on its security can be pr...
Simon R. Blackburn, Kenneth G. Paterson
FSE
2004
Springer
115views Cryptology» more  FSE 2004»
13 years 10 months ago
Correlation Attacks Using a New Class of Weak Feedback Polynomials
In 1985 Siegenthaler introduced the concept of correlation attacks on LFSR based stream ciphers. A few years later Meier and Staffelbach demonstrated a special technique, usually ...
Håkan Englund, Martin Hell, Thomas Johansson
FSE
2004
Springer
101views Cryptology» more  FSE 2004»
13 years 10 months ago
The EAX Mode of Operation
Mihir Bellare, Phillip Rogaway, David Wagner
FSE
2004
Springer
94views Cryptology» more  FSE 2004»
13 years 10 months ago
Improving Fast Algebraic Attacks
Frederik Armknecht
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
13 years 10 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin
FSE
2004
Springer
84views Cryptology» more  FSE 2004»
13 years 10 months ago
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines
We present a realization of an LFSM that utilizes an LFSR. This is based on a well-known fact from linear algebra. This structure is used to show that a previous attempt at using a...
Jin Hong, Dong Hoon Lee 0002, Seongtaek Chee, Pala...