Sciweavers

541 search results - page 27 / 109
» A generic attack to ciphers
Sort
View
ASIACRYPT
2001
Springer
15 years 4 months ago
Known-IV Attacks on Triple Modes of Operation of Block Ciphers
With chosen-IV chosen texts, David Wagner has analyzed the multiple modes of operation proposed by Eli Biham in FSE’98. However, his method is too unrealistic. We use only known-...
Deukjo Hong, Jaechul Sung, Seokhie Hong, Wonil Lee...
CRYPTO
2009
Springer
106views Cryptology» more  CRYPTO 2009»
15 years 6 months ago
New Birthday Attacks on Some MACs Based on Block Ciphers
Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiao...
AFRICACRYPT
2008
Springer
15 years 6 months ago
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
Simon Fischer 0002, Shahram Khazaei, Willi Meier
CRYPTOLOGIA
2008
60views more  CRYPTOLOGIA 2008»
14 years 12 months ago
Algebraic Attacks on the Courtois Toy Cipher
Martin Albrecht