Sciweavers

FSE
2010
Springer
140views Cryptology» more  FSE 2010»
13 years 9 months ago
Cryptanalysis of ESSENCE
ESSENCE is a hash function submitted to the NIST Hash Competition that stands out as a hardware-friendly and highly parallelizable design. Previous analysis showed some non-randomn...
María Naya-Plasencia, Andrea Röck, Jea...
FSE
2010
Springer
132views Cryptology» more  FSE 2010»
13 years 9 months ago
Attacking the Knudsen-Preneel Compression Functions
Onur Özen, Thomas Shrimpton, Martijn Stam
FSE
2010
Springer
144views Cryptology» more  FSE 2010»
13 years 9 months ago
Pseudo-cryptanalysis of the Original Blue Midnight Wish
The hash function Blue Midnight Wish (BMW) is a candidate in the SHA-3 competition organised by the U.S. National Institute of Standards and Technology (NIST). BMW was selected fo...
Søren S. Thomsen
FSE
2010
Springer
180views Cryptology» more  FSE 2010»
13 years 9 months ago
Fast Software AES Encryption
This paper presents new software speed records for AES-128 encryption for architectures at both ends of the performance spectrum. On the one side we target the low-end 8-bit AVR mi...
Dag Arne Osvik, Joppe W. Bos, Deian Stefan, David ...
FSE
2010
Springer
162views Cryptology» more  FSE 2010»
13 years 9 months ago
Differential and Invertibility Properties of BLAKE
Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf,...
FSE
2010
Springer
127views Cryptology» more  FSE 2010»
13 years 9 months ago
Another Look at Complementation Properties
Charles Bouillaguet, Orr Dunkelman, Gaëtan Le...
FSE
2010
Springer
185views Cryptology» more  FSE 2010»
13 years 9 months ago
Cryptanalysis of the DECT Standard Cipher
Karsten Nohl, Erik Tews, Ralf-Philipp Weinmann