Sciweavers

15 search results - page 2 / 3
» Cryptanalysis of Reduced-Round Whirlwind
Sort
View
CANS
2010
Springer
258views Cryptology» more  CANS 2010»
15 years 2 months ago
Cryptanalysis of Reduced-Round MIBS Block Cipher
Abstract. This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at ...
Asli Bay, Jorge Nakahara, Serge Vaudenay
151
Voted
WEWORC
2007
148views Cryptology» more  WEWORC 2007»
15 years 5 months ago
Preimages for Reduced-Round Tiger
The cryptanalysis of the cryptographic hash function Tiger has, until now, focussed on finding collisions. In this paper we describe a preimage attack on the compression function ...
Sebastiaan Indesteege, Bart Preneel
ACNS
2011
Springer
254views Cryptology» more  ACNS 2011»
14 years 7 months ago
Linear Analysis of Reduced-Round CubeHash
Abstract. Recent developments in the field of cryptanalysis of hash functions has inspired NIST to announce a competition for selecting a new cryptographic hash function to join t...
Tomer Ashur, Orr Dunkelman
CISC
2007
Springer
125views Cryptology» more  CISC 2007»
15 years 10 months ago
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent
Abstract. This paper reports on the improved and multiple linear cryptanalysis of reduced round Serpent by mean of a branch-and-bound characteristic search within the algorithm. We...
Baudoin Collard, François-Xavier Standaert,...
ACNS
2008
Springer
107views Cryptology» more  ACNS 2008»
15 years 10 months ago
Attacking Reduced Round SHA-256
The SHA-256 hash function has started getting attention recently by the cryptanalysis community
Somitra Kumar Sanadhya, Palash Sarkar