Sciweavers

FSE
2006
Springer
114views Cryptology» more  FSE 2006»
13 years 8 months ago
Cryptanalysis of the Full HAVAL with 4 and 5 Passes
Abstract. HAVAL is a cryptographic hash function with variable digest size proposed by Zheng, Pieprzyk and Seberry in 1992. It has three variants, 3-, 4-, and 5-pass HAVAL. Previou...
Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park
FSE
2006
Springer
94views Cryptology» more  FSE 2006»
13 years 8 months ago
Resynchronization Attacks on WG and LEX
WG and LEX are two stream ciphers submitted to eStream
Hongjun Wu, Bart Preneel
FSE
2006
Springer
116views Cryptology» more  FSE 2006»
13 years 8 months ago
On Feistel Structures Using a Diffusion Switching Mechanism
We study a recently proposed design approach of Feistel structure which employs diffusion matrices in a switching way. At ASIACRYPT 2004, Shirai and Preneel have proved that large ...
Taizo Shirai, Kyoji Shibutani
FSE
2006
Springer
101views Cryptology» more  FSE 2006»
13 years 8 months ago
Searching for Differential Paths in MD4
The ground-breaking results of Wang et al. have attracted a lot of attention to the collision resistance of hash functions. In their articles, Wang et al. give input differences, d...
Martin Schläffer, Elisabeth Oswald
FSE
2006
Springer
174views Cryptology» more  FSE 2006»
13 years 8 months ago
Distinguishing Attacks on the Stream Cipher Py
The stream cipher Py designed by Biham and Seberry is a submission to the ECRYPT stream cipher competition. The cipher is based on two large arrays (one is 256 bytes and the other ...
Souradyuti Paul, Bart Preneel, Gautham Sekar
FSE
2006
Springer
124views Cryptology» more  FSE 2006»
13 years 8 months ago
Improved Linear Distinguishers for SNOW 2.0
In this paper we present new and more accurate estimates of the biases of the linear approximation of the FSM of the stream cipher SNOW 2.0. Based on improved bias estimates we als...
Kaisa Nyberg, Johan Wallén
FSE
2006
Springer
86views Cryptology» more  FSE 2006»
13 years 8 months ago
Upper Bounds on Algebraic Immunity of Boolean Power Functions
Yassir Nawaz, Guang Gong, Kishan Chand Gupta
FSE
2006
Springer
89views Cryptology» more  FSE 2006»
13 years 8 months ago
The Impact of Carries on the Complexity of Collision Attacks on SHA-1
In this article we present a detailed analysis of the impact
Florian Mendel, Norbert Pramstaller, Christian Rec...
FSE
2006
Springer
111views Cryptology» more  FSE 2006»
13 years 8 months ago
Analysis of Step-Reduced SHA-256
This is the first article analyzing the security of SHA-256 against fast collision search which considers the recent attacks by Wang et al. We show the limits of applying technique...
Florian Mendel, Norbert Pramstaller, Christian Rec...