Sciweavers

FSE
2005
Springer
98views Cryptology» more  FSE 2005»
13 years 10 months ago
New Attacks Against Reduced-Round Versions of IDEA
In this paper, we describe a sequence of simple, yet efficient chosen-plaintext (or chosen-ciphertext) attacks against reduced-round versions of IDEA (with 2, 2.5, 3, 3.5, and 4 ro...
Pascal Junod
FSE
2005
Springer
122views Cryptology» more  FSE 2005»
13 years 10 months ago
Analysis of the Bit-Search Generator and Sequence Compression Techniques
Abstract. Algebraic attacks on stream ciphers apply (at least theoretically) to all LFSR-based stream ciphers that are clocked in a simple and/or easily predictable way. One intere...
Aline Gouget, Hervé Sibert, Côme Berb...
FSE
2005
Springer
107views Cryptology» more  FSE 2005»
13 years 10 months ago
Small Scale Variants of the AES
In this paper we define small scale variants of the AES. These variants inherit the design features of the AES and provide a suitable framework for comparing different cryptanaly...
Carlos Cid, Sean Murphy, Matthew J. B. Robshaw
FSE
2005
Springer
85views Cryptology» more  FSE 2005»
13 years 10 months ago
Analysis of the Non-linear Part of Mugi
This paper presents the results of a preliminary analysis of the stream cipher Mugi. We study the nonlinear component of this cipher and identify several potential weaknesses in it...
Alex Biryukov, Adi Shamir
FSE
2005
Springer
87views Cryptology» more  FSE 2005»
13 years 10 months ago
Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4
Eli Biham, Louis Granboulan, Phong Q. Nguyen
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
13 years 10 months ago
A New Distinguisher for Clock Controlled Stream Ciphers
In this paper we present a distinguisher targeting towards irregularly clocked filter generators. The attack is applied on the irregularly clocked stream cipher called LILI-II. LI...
Håkan Englund, Thomas Johansson
FSE
2005
Springer
119views Cryptology» more  FSE 2005»
13 years 10 months ago
The Poly1305-AES Message-Authentication Code
Poly1305-AES is a state-of-the-art message-authentication code suitable for a wide variety of applications. Poly1305-AES computes a 16-byte authenticator of a variable-length messa...
Daniel J. Bernstein
FSE
2005
Springer
116views Cryptology» more  FSE 2005»
13 years 10 months ago
Narrow T-Functions
T-functions were introduced by Klimov and Shamir in a series of papers during the last few years. They are of great interest for cryptography as they may provide some new building ...
Magnus Daum
FSE
2005
Springer
153views Cryptology» more  FSE 2005»
13 years 10 months ago
F-FCSR: Design of a New Class of Stream Ciphers
In this paper we present a new class of stream ciphers based on a very simple mechanism. The heart of our method is a Feedback with Carry Shift Registers (FCSR) automaton. This au...
François Arnault, Thierry P. Berger
FSE
2005
Springer
97views Cryptology» more  FSE 2005»
13 years 10 months ago
A New Class of Single Cycle T-Functions
T-function is a relatively new cryptographic building block suitable for streamciphers. It has the potential of becoming a substitute for LFSRs, and those that correspond to maximu...
Jin Hong, Dong Hoon Lee 0002, Yongjin Yeom, Daewan...