Sciweavers

FSE
2009
Springer
472views Cryptology» more  FSE 2009»
16 years 29 days ago
Algebraic Techniques in Differential Cryptanalysis
In this paper we propose a new cryptanalytic method against block ciphers, which combines both algebraic and statistical techniques. More specifically, we show how to use algebraic...
Martin Albrecht, Carlos Cid
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
16 years 29 days ago
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2)
MULTI2 is the block cipher used in the ISDB standard for scrambling digital multimedia content. MULTI2 is used in Japan to secure multimedia broadcasting, including recent applicat...
Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan...
93
Voted
FSE
2009
Springer
189views Cryptology» more  FSE 2009»
16 years 29 days ago
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
Jean-Philippe Aumasson, Itai Dinur, Willi Meier, A...
83
Voted
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
15 years 7 months ago
Meet-in-the-Middle Attacks on SHA-3 Candidates
Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp W...
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
15 years 7 months ago
Intel's New AES Instructions for Enhanced Performance and Security
The Advanced Encryption Standard (AES) is the Federal Information Processing Standard for symmetric encryption. It is widely believed to be secure and efficient, and is therefore b...
Shay Gueron
Cryptology
Top of PageReset Settings