Sciweavers

FSE
2007
Springer
263views Cryptology» more  FSE 2007»
15 years 6 months ago
Bad and Good Ways of Post-processing Biased Physical Random Numbers
Algorithmic post-processing is used to overcome statistical deficiencies of physical random number generators. We show that the quasigroup based approach for post-processing rando...
Markus Dichtl
FSE
2007
Springer
250views Cryptology» more  FSE 2007»
15 years 6 months ago
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
This paper examines the security of AES-192 and AES-256 against a related-key rectangle attack. We find the following new attacks: 8-round reduced AES-192 with 2 related keys, 10-...
Jongsung Kim, Seokhie Hong, Bart Preneel
FSE
2007
Springer
192views Cryptology» more  FSE 2007»
15 years 6 months ago
Algebraic Cryptanalysis of 58-Round SHA-1
In 2004, a new attack against SHA-1 has been proposed by a team leaded by Wang [15]. The aim of this article5 is to sophisticate and improve Wang’s attack by using algebraic tech...
Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hi...
FSE
2007
Springer
155views Cryptology» more  FSE 2007»
15 years 6 months ago
Algebraic Immunity of S-Boxes and Augmented Functions
Simon Fischer 0002, Willi Meier
FSE
2007
Springer
153views Cryptology» more  FSE 2007»
15 years 6 months ago
A New Attack on 6-Round IDEA
IDEA is a 64-bit block cipher with 128-bit keys introduced
Eli Biham, Orr Dunkelman, Nathan Keller
Cryptology
Top of PageReset Settings