Sciweavers

FSE
2009
Springer
148views Cryptology» more  FSE 2009»
13 years 7 months ago
Cryptanalysis of the LAKE Hash Family
We analyse the security of the cryptographic hash function LAKE-256 proposed at FSE 2008 by Aumasson, Meier and Phan. By exploiting non-injectivity of some of the building primitiv...
Alex Biryukov, Praveen Gauravaram, Jian Guo, Dmitr...
FSE
2009
Springer
123views Cryptology» more  FSE 2009»
13 years 9 months ago
Fast and Secure CBC-Type MAC Algorithms
Abstract. The CBC-MAC or cipher block chaining message authentication code, is a well-known method to generate message authentication codes. Unfortunately, it is not forgery-secure...
Mridul Nandi
FSE
2009
Springer
143views Cryptology» more  FSE 2009»
13 years 11 months ago
New Distinguishing Attack on MAC Using Secret-Prefix Method
Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang
FSE
2009
Springer
107views Cryptology» more  FSE 2009»
13 years 11 months ago
Multidimensional Extension of Matsui's Algorithm 2
Matsui’s one-dimensional Alg. 2 can be used for recovering bits of the last round key of a block cipher. In this paper a truly multidimensional extension of Alg. 2 based on estab...
Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
13 years 11 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
FSE
2009
Springer
148views Cryptology» more  FSE 2009»
13 years 11 months ago
Revisiting the IDEA Philosophy
Pascal Junod, Marco Macchetti
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
13 years 11 months ago
Meet-in-the-Middle Attacks on SHA-3 Candidates
Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp W...
FSE
2009
Springer
152views Cryptology» more  FSE 2009»
14 years 4 months ago
Blockcipher-Based Hashing Revisited
We revisit the rate-1 blockcipher based hash functions as first studied by Preneel, Govaerts and Vandewalle (Crypto'93) and later extensively analysed by Black, Rogaway and Sh...
Martijn Stam
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
14 years 4 months ago
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
Jean-Philippe Aumasson, Itai Dinur, Willi Meier, A...