Sciweavers

74 search results - page 1 / 15
» A Key Recovery Attack on Edon80
Sort
View
90
Voted
ASIACRYPT
2007
Springer
15 years 5 months ago
A Key Recovery Attack on Edon80
Edon80 is a recent stream cipher design that has advanced to the third and last phase of the eSTREAM project. It has remained unbroken and untweaked since it was designed and submi...
Martin Hell, Thomas Johansson
86
Voted
CRYPTO
2008
Springer
100views Cryptology» more  CRYPTO 2008»
15 years 21 days ago
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms
Abstract. This paper discusses key recovery and universal forgery attacks on several MAC algorithms based on universal hash functions. The attacks use a substantial number of verif...
Helena Handschuh, Bart Preneel
79
Voted
ASIACRYPT
2006
Springer
15 years 2 months ago
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions
Scott Contini, Yiqun Lisa Yin
94
Voted
EUROCRYPT
2008
Springer
15 years 20 days ago
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5
Lei Wang, Kazuo Ohta, Noboru Kunihiro
87
Voted
CRYPTO
2000
Springer
123views Cryptology» more  CRYPTO 2000»
15 years 3 months ago
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
Abstract. We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a forgery attack. Unlike previous attacks, th...
Don Coppersmith, Lars R. Knudsen, Chris J. Mitchel...