Sciweavers

396 search results - page 51 / 80
» Contemporary Block Ciphers
Sort
View
128
Voted
ASIACRYPT
1992
Springer
15 years 4 months ago
On the Power of Memory in the Design of Collision Resistant Hash Functions
Collision resistant hash functions are an important basic tool for cryptographic applications such as digital signature schemes and integrity protection based on "fingerprinti...
Bart Preneel, René Govaerts, Joos Vandewall...
SACRYPT
1998
Springer
101views Cryptology» more  SACRYPT 1998»
15 years 4 months ago
On the Twofish Key Schedule
Twofish is a new block cipher with a 128 bit block, and a key length of 128, 192, or 256 bits, which has been submitted as an AES candidate. In this paper, we briefly review the st...
Bruce Schneier, John Kelsey, Doug Whiting, David W...
IJCSA
2007
101views more  IJCSA 2007»
15 years 11 days ago
Concurrent Error Detection in S-boxes
In this paper we present low -cost, concurrent checking methods for multiple error detection in S-boxes of symmetric block ciphers. These are redundancy-based fault detection sche...
Ewa Idzikowska, Krzysztof Bucholc
124
Voted
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
15 years 7 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
112
Voted
EUROCRYPT
2003
Springer
15 years 5 months ago
Facts and Myths of Enigma: Breaking Stereotypes
In spite of a relatively large number of publications about breaking Enigma by the Allies before and during the World War II, this subject remains relatively unknown not only to th...
Kris Gaj, Arkadiusz Orlowski