144
click to vote
FSE
15 years 6 months ago
2007 Springer
Algorithmic post-processing is used to overcome statistical deficiencies of physical random number generators. We show that the quasigroup based approach for post-processing rando...
FSE
15 years 6 months ago
2007 Springer
This paper examines the security of AES-192 and AES-256 against a related-key rectangle attack. We find the following new attacks: 8-round reduced AES-192 with 2 related keys, 10-...
FSE
15 years 6 months ago
2007 Springer
In 2004, a new attack against SHA-1 has been proposed by a team leaded by Wang [15]. The aim of this article5 is to sophisticate and improve Wang’s attack by using algebraic tech...
FSE
15 years 6 months ago
2007 Springer FSE
15 years 6 months ago
2007 Springer
IDEA is a 64-bit block cipher with 128-bit keys introduced
|