Sciweavers

541 search results - page 7 / 109
» A generic attack to ciphers
Sort
View
75
Voted
PROVSEC
2007
Springer
15 years 3 months ago
On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers
Security of a modern block cipher is commonly measured in terms of its resistance to known attacks. While the provable security approach to block ciphers dates back to the first C...
Ermaliza Razali, Raphael C.-W. Phan, Marc Joye
SACRYPT
1998
Springer
112views Cryptology» more  SACRYPT 1998»
15 years 1 months ago
Cryptanalysis of ORYX
Abstract. We present an attack on the ORYX stream cipher that requires only 25
David Wagner, Leone Simpson, Ed Dawson, John Kelse...
FSE
2003
Springer
135views Cryptology» more  FSE 2003»
15 years 2 months ago
New Attacks against Standardized MACs
In this paper, we revisit the security of several message authentication code (MAC) algorithms based on block ciphers, when instantiated with 64-bit block ciphers such as DES. We e...
Antoine Joux, Guillaume Poupard, Jacques Stern
86
Voted
ACISP
2007
Springer
15 years 3 months ago
An Analysis of the Hermes8 Stream Ciphers
Hermes8 [6,7] is one of the stream ciphers submitted to the ECRYPT Stream Cipher Project (eSTREAM [3]). In this paper we present an analysis of the Hermes8 stream ciphers. In parti...
Steve Babbage, Carlos Cid, Norbert Pramstaller, H&...
83
Voted
CTRSA
2007
Springer
153views Cryptology» more  CTRSA 2007»
15 years 1 months ago
Differential Power Analysis of Stream Ciphers
Side-channel attacks on block ciphers and public key algorithms have been discussed extensively. However, there is only sparse literature about side-cannel attacks on stream cipher...
Wieland Fischer, Berndt M. Gammel, O. Kniffler, J....