Sciweavers

517 search results - page 7 / 104
» Bit Encryption Is Complete
Sort
View
AES
2000
Springer
136views Cryptology» more  AES 2000»
15 years 4 months ago
Preliminary Cryptanalysis of Reduced-Round Serpent
Serpent is a 32-round AES block cipher finalist. In this paper we present several attacks on reduced-round variants of Serpent that require less work than exhaustive search. We at...
Tadayoshi Kohno, John Kelsey, Bruce Schneier
CRYPTOLOGIA
2006
155views more  CRYPTOLOGIA 2006»
14 years 11 months ago
The Whirlpool Secure Hash Function
In this paper, we describe Whirlpool, which is a block-cipher-based secure hash function. Whirlpool produces a hash code of 512 bits for an input message of maximum length less tha...
William Stallings
ACMSE
2004
ACM
15 years 5 months ago
Trust based adaptive on demand ad hoc routing protocol
In this paper, we propose a routing protocol that is based on securing the routing information from unauthorized users. Even though routing protocols of this category are already ...
Rajiv K. Nekkanti, Chung-wei Lee
SACRYPT
1998
Springer
15 years 3 months ago
A Timing Attack on RC5
Abstract. This paper describes a timing attack on the RC5 block encryption algorithm. The analysis is motivated by the possibility that some implementations of RC5 could result in ...
Helena Handschuh, Howard M. Heys