Sciweavers

378 search results - page 7 / 76
» A Traceable Block Cipher
Sort
View
CEE
2004
205views more  CEE 2004»
15 years 3 months ago
64-bit Block ciphers: hardware implementations and comparison analysis
A performance comparison for the 64-bit block cipher (Triple-DES, IDEA, CAST-128, MISTY1, and KHAZAD) FPGA hardware implementations is given in this paper. All these ciphers are u...
Paris Kitsos, Nicolas Sklavos, Michalis D. Galanis...
WISA
2009
Springer
15 years 10 months ago
Unknown Plaintext Template Attacks
In this paper we present a variation of the template attack classification process that can be applied to block ciphers when the plaintext and ciphertext used are unknown. In a na...
Neil Hanley, Michael Tunstall, William P. Marnane
ISCAS
2006
IEEE
163views Hardware» more  ISCAS 2006»
15 years 9 months ago
ASIC hardware implementation of the IDEA NXT encryption algorithm
— Symmetric-key block ciphers are often used to provide data confidentiality with low complexity, especially in the case of dedicated hardware implementations. IDEA NXT is a nov...
Marco Macchetti, Wenyu Chen
DAGSTUHL
2007
15 years 4 months ago
A Collision-Resistant Rate-1 Double-Block-Length Hash Function
This paper proposes a construction for collision resistant 2n-bit hash functions, based on n-bit block ciphers with 2n-bit keys. The construction is analysed in the ideal cipher mo...
Stefan Lucks
CTRSA
2007
Springer
119views Cryptology» more  CTRSA 2007»
15 years 9 months ago
A Simple Related-Key Attack on the Full SHACAL-1
SHACAL-1 is a 160-bit block cipher with variable key length
Eli Biham, Orr Dunkelman, Nathan Keller