Sciweavers

SACRYPT
2007
Springer
13 years 11 months ago
Two Trivial Attacks on Trivium
Trivium is a stream cipher designed in 2005 by C. De Canni`ere and B. Preneel for the European project eSTREAM. It has successfully passed the first phase of the project and has ...
Alexander Maximov, Alex Biryukov
SACRYPT
2007
Springer
151views Cryptology» more  SACRYPT 2007»
13 years 11 months ago
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search
The diversity of methods for fast collision search in SHA-1 and similar hash functions makes a comparison of them difficult. The literature is at times very vague on this issue, wh...
Christophe De Cannière, Florian Mendel, Chr...
SACRYPT
2007
Springer
126views Cryptology» more  SACRYPT 2007»
13 years 11 months ago
Improved Side-Channel Collision Attacks on AES
Abstract. Side-channel collision attacks were proposed in [1] and applied to AES in [2]. These are based on detecting collisions in certain positions of the internal state after th...
Andrey Bogdanov
SACRYPT
2007
Springer
13 years 11 months ago
Linear Cryptanalysis of Non Binary Ciphers
Thomas Baignères, Jacques Stern, Serge Vaud...
SACRYPT
2007
Springer
13 years 11 months ago
Reduced Complexity Attacks on the Alternating Step Generator
Shahram Khazaei, Simon Fischer 0002, Willi Meier
SACRYPT
2007
Springer
167views Cryptology» more  SACRYPT 2007»
13 years 11 months ago
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings
Abstract. At DRM 2002, Chow et al. [4] presented a method for implementing the DES block cipher such that it becomes hard to extract the embedded secret key in a white-box attack c...
Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart P...
SACRYPT
2007
Springer
145views Cryptology» more  SACRYPT 2007»
13 years 11 months ago
Passive-Only Key Recovery Attacks on RC4
Abstract. We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by th...
Serge Vaudenay, Martin Vuagnoux
SACRYPT
2007
Springer
13 years 11 months ago
Koblitz Curves and Integer Equivalents of Frobenius Expansions
Billy Bob Brumley, Kimmo U. Järvinen
SACRYPT
2007
Springer
13 years 11 months ago
The Security of the Extended Codebook (XCB) Mode of Operation
Abstract. The XCB mode of operation was outlined in 2004 as a contribution to the IEEE Security in Storage effort, but no security analysis was provided. In this paper, we provide...
David A. McGrew, Scott R. Fluhrer