Sciweavers

130
Voted
FSE
2000
Springer
128views Cryptology» more  FSE 2000»
15 years 7 months ago
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators
This paper presents an operational reconstruction technique of most stream ciphers. We primarily expose it for key-stream generators which consist of several linear feedback shift ...
Anne Canteaut, Eric Filiol
213
Voted
FSE
2000
Springer
91views Cryptology» more  FSE 2000»
15 years 7 months ago
A Statistical Attack on RC6
This paper details the attack on RC6 which was announced in a report published in the proceedings of the second AES candidate conference (March 1999). Based on an observation on th...
Henri Gilbert, Helena Handschuh, Antoine Joux, Ser...
98
Voted
FSE
2000
Springer
111views Cryptology» more  FSE 2000»
15 years 7 months ago
Real Time Cryptanalysis of A5/1 on a PC
Alex Biryukov, Adi Shamir, David Wagner
114
Voted
FSE
2000
Springer
101views Cryptology» more  FSE 2000»
15 years 7 months ago
Improved Cryptanalysis of Rijndael
We improve the best attack on Rijndael reduced to 6 rounds from complexity 272 to 244 . We also present the first known attacks on 7- and 8-round Rijndael. The attacks on 8-round R...
Niels Ferguson, John Kelsey, Stefan Lucks, Bruce S...
137
Voted
FSE
2000
Springer
153views Cryptology» more  FSE 2000»
15 years 7 months ago
Bitslice Ciphers and Power Analysis Attacks
In this paper, we present techniques to protect bitslice block ciphers against power analysis attacks. We analyze and extend a technique proposed in [14]. We apply the technique to...
Joan Daemen, Michael Peeters, Gilles Van Assche