Sciweavers

541 search results - page 28 / 109
» A generic attack to ciphers
Sort
View
89
Voted
JOC
2006
64views more  JOC 2006»
15 years 1 months ago
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers
Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee,...
JISE
2000
43views more  JISE 2000»
15 years 1 months ago
The Block Cipher: SEA2 With Provable Resistance Against DC and LC Attacks
Shih-Hsu Chang, Fang-Hsuan Cheng, Wen-Hsing Hsu
CRYPTO
1993
Springer
131views Cryptology» more  CRYPTO 1993»
15 years 6 months ago
Hash Functions Based on Block Ciphers: A Synthetic Approach
Constructions for hash functions based on a block cipher are studied where the size of the hashcode is equal to the block length of the block cipher and where the key size is appro...
Bart Preneel, René Govaerts, Joos Vandewall...
90
Voted
FSE
2007
Springer
116views Cryptology» more  FSE 2007»
15 years 8 months ago
Two General Attacks on Pomaranch-Like Keystream Generators
Two general attacks that can be applied to all versions and variants of the Pomaranch stream cipher are presented. The attacks are demonstrated on all versions and succeed with com...
Håkan Englund, Martin Hell, Thomas Johansson
132
Voted
CANS
2010
Springer
258views Cryptology» more  CANS 2010»
14 years 12 months ago
Cryptanalysis of Reduced-Round MIBS Block Cipher
Abstract. This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at ...
Asli Bay, Jorge Nakahara, Serge Vaudenay