Sciweavers

74 search results - page 2 / 15
» A Key Recovery Attack on Edon80
Sort
View
ASIACRYPT
2011
Springer
13 years 11 months ago
Biclique Cryptanalysis of the Full AES
Since Rijndael was chosen as the Advanced Encryption Standard, improving upon 7-round attacks on the 128-bit key variant or upon 8-round attacks on the 192/256-bit key variants has...
Andrey Bogdanov, Dmitry Khovratovich, Christian Re...
IACR
2011
85views more  IACR 2011»
13 years 11 months ago
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
The hardware-attractive block cipher family KTANTAN was studied by Bogdanov and Rechberger who identified flaws in the key schedule and gave a meet-in-the-middle attack. We revis...
Martin Ågren
98
Voted
CSI
2004
110views more  CSI 2004»
14 years 11 months ago
A novel three-party encrypted key exchange protocol
The key exchange protocol is one of the most elegant ways of establishing secure communication between pair of users by using a session key. The passwords are of low entropy, henc...
Chin-Chen Chang, Ya-Fen Chang
ACNS
2011
Springer
231views Cryptology» more  ACNS 2011»
14 years 3 months ago
Cold Boot Key Recovery by Solving Polynomial Systems with Noise
A method for extracting cryptographic key material from DRAM used in modern computers has been recently proposed in [9]; the technique was called Cold Boot attacks. When considerin...
Martin Albrecht, Carlos Cid
86
Voted
ISW
1997
Springer
15 years 3 months ago
Cryptanalysis of Message Authentication Codes
This paper gives a survey of attacks on Message Authentication Codes (MACs). First it defines the required security properties. Next it describes generic forgery and key recovery...
Bart Preneel