Sciweavers

IACR
2016
45views Biometrics» more  IACR 2016»
10 years 1 months ago
Reverse-Engineering the S-Box of Streebog, Kuznyechik and STRIBOBr1
The Russian Federation’s standardization agency has recently published a hash function called Streebog and a 128-bit block cipher called Kuznyechik. Both of these algorithms use ...
Alex Biryukov, Léo Perrin, Aleksei Udovenko
IACR
2016
44views Biometrics» more  IACR 2016»
10 years 1 months ago
Automatic Expectation and Variance Computing for Attacks on Feistel Schemes
There are many kinds of attacks that can be mounted on block ciphers: differential attacks, impossible differential attacks, truncated differential attacks, boomerang attacks. W...
Emmanuel Volte, Valérie Nachef, Nicolas Mar...
IACR
2016
32views Biometrics» more  IACR 2016»
10 years 1 months ago
Tightly-Secure Pseudorandom Functions via Work Factor Partitioning
We introduce a new technique for tight security proofs called work factor partitioning. Using this technique in a modified version of the framework of D¨ottling and Schr¨oder (C...
Tibor Jager
IACR
2016
43views Biometrics» more  IACR 2016»
10 years 1 months ago
Speed and Area Optimized Parallel Higher-Radix Modular Multipliers
—Modular multiplication is the fundamental and compute-intense operation in many Public-Key crypto-systems. This paper presents two modular multipliers with their efficient arch...
Khalid Javeed, Xiaojun Wang