Sciweavers

SACRYPT
2000
Springer
118views Cryptology» more  SACRYPT 2000»
13 years 8 months ago
Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security
We present and analyze attacks on additive stream ciphers that rely on linear equations that hold with non-trivial probability in plaintexts that are encrypted using distinct keys....
David A. McGrew, Scott R. Fluhrer
PPPJ
2003
ACM
13 years 10 months ago
A Java implemented key collision attack on the data encryption standard (DES)
A Java implementation of a key collision attack on DES suggested by Eli Biham, [1], is discussed. Storage space minimization and fast searching techniques to speed up the attack a...
John Loughran, Tom Dowling