Sciweavers

123 search results - page 2 / 25
» Cryptanalysis of 2R- Schemes
Sort
View
IPL
2006
65views more  IPL 2006»
14 years 9 months ago
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme
We propose cryptanalysis of the First Domingo-Ferrer's algebraic privacy homomorphism E : Zn (Zp
Jung Hee Cheon, Woo-Hwan Kim, Hyun Soo Nam
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
CHES
2010
Springer
175views Cryptology» more  CHES 2010»
14 years 10 months ago
Side-Channel Analysis of Six SHA-3 Candidates
Abstract. In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choic...
Olivier Benoît, Thomas Peyrin
IACR
2011
207views more  IACR 2011»
13 years 9 months ago
Cryptanalysis and Security Enhancement of an Advanced Authentication Scheme using Smart Cards, and a Key Agreement Scheme for Tw
Abstract—In this work we consider two protocols for performing cryptanalysis and security enhancement. The first one by Song, is a password authentication scheme based on smart ...
Swapnoneel Roy, Amlan K. Das, Yu Li
FSE
2010
Springer
220views Cryptology» more  FSE 2010»
15 years 2 months ago
Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations
In this paper, we improve the recent rebound and start-from-the-middle attacks on AES-like permutations. Our new cryptanalysis technique uses the fact that one can view two rounds ...
Henri Gilbert, Thomas Peyrin