138
click to vote
FSE
15 years 6 months ago
2003 Springer
Hypothesis tests have been used in the past as a tool in a cryptanalytic context. In this paper, we propose to use this paradigm and define a precise and sound statistical framewo...
138
click to vote
FSE
15 years 6 months ago
2003 Springer
We present our further observations on the structure of the AES algorithm relating to the cyclic properties of the functions used in this cipher. We note that the maximal period of...
135
click to vote
FSE
15 years 6 months ago
2003 Springer
In this paper the newly proposed RMAC system is analysed and a generic attack is presented. The attack can be used to find one of the two keys in the system faster than by an exh...
117
click to vote
FSE
15 years 6 months ago
2003 Springer
Abstract. In this paper we compare systems of multivariate polynomials, which completely define the block ciphers Khazad, Misty1, Kasumi, Camellia, Rijndael and Serpent in the vie...
152
click to vote
FSE
15 years 6 months ago
2003 Springer
Abstract. This paper proposes the Turing stream cipher. Turing offers up to 256-bit key strength, and is designed for extremely efficient software implementation.It combines an LFS...
|