Sciweavers

Share
SACRYPT
2009
Springer
137views Cryptology» more  SACRYPT 2009»
9 years 1 months ago
Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård
Elena Andreeva, Charles Bouillaguet, Orr Dunkelman...
SACRYPT
2009
Springer
176views Cryptology» more  SACRYPT 2009»
9 years 3 months ago
Optimization Strategies for Hardware-Based Cofactorization
Abstract. We use the specific structure of the inputs to the cofactorization step in the general number field sieve (GNFS) in order to optimize the runtime for the cofactorizatio...
Daniel Loebenberger, Jens Putzka
SACRYPT
2009
Springer
162views Cryptology» more  SACRYPT 2009»
9 years 3 months ago
Practical Pseudo-collisions for Hash Functions ARIRANG-224/384
Abstract. In this paper we analyse the security of the SHA-3 candidate ARIRANG. We show that bitwise complementation of whole registers turns out to be very useful for constructing...
Jian Guo, Krystian Matusiewicz, Lars R. Knudsen, S...
SACRYPT
2009
Springer
142views Cryptology» more  SACRYPT 2009»
9 years 3 months ago
On Repeated Squarings in Binary Fields
Kimmo U. Järvinen
SACRYPT
2009
Springer
130views Cryptology» more  SACRYPT 2009»
9 years 3 months ago
Format-Preserving Encryption
Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a ...
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway,...
SACRYPT
2009
Springer
147views Cryptology» more  SACRYPT 2009»
9 years 3 months ago
A New Approach for FCSRs
The Feedback with Carry Shift Registers (FCSRs) have been proposed as an alternative to Linear Feedback Shift Registers (LFSRs) for the design of stream ciphers. FCSRs have good st...
François Arnault, Thierry P. Berger, C&eacu...
SACRYPT
2009
Springer
155views Cryptology» more  SACRYPT 2009»
9 years 3 months ago
Practical Collisions for SHAMATA-256
In this paper, we present a collision attack on the SHA-3 submission SHAMATA. SHAMATA is a stream cipher-like hash function design with components of the AES, and it is one of the ...
Sebastiaan Indesteege, Florian Mendel, Bart Prenee...
SACRYPT
2009
Springer
141views Cryptology» more  SACRYPT 2009»
9 years 3 months ago
Cryptanalysis of Dynamic SHA(2)
In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash fun...
Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan ...
SACRYPT
2009
Springer
212views Cryptology» more  SACRYPT 2009»
9 years 3 months ago
Compact McEliece Keys from Goppa Codes
The classical McEliece cryptosystem is built upon the class of Goppa codes, which remains secure to this date in contrast to many other families of codes but leads to very large pu...
Rafael Misoczki, Paulo S. L. M. Barreto
books