Sciweavers

427 search results - page 29 / 86
» Cryptanalysis of the
Sort
View
CTRSA
2007
Springer
184views Cryptology» more  CTRSA 2007»
15 years 8 months ago
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function
FORK-256 is a hash function presented at FSE 2006. Whereas SHA-like designs process messages in one stream, FORK-256 uses four parallel streams for hashing. In this article, we pre...
Florian Mendel, Joseph Lano, Bart Preneel
EUROCRYPT
2007
Springer
15 years 8 months ago
Cryptanalysis of the Sidelnikov Cryptosystem
We present a structural attack against the Sidelnikov cryptosystem [8]. The attack creates a private key from a given public key. Its running time is subexponential and is effecti...
Lorenz Minder, Amin Shokrollahi
FSE
2007
Springer
114views Cryptology» more  FSE 2007»
15 years 8 months ago
Cryptanalysis of Achterbahn-128/80
María Naya-Plasencia
FSE
2007
Springer
192views Cryptology» more  FSE 2007»
15 years 8 months ago
Algebraic Cryptanalysis of 58-Round SHA-1
In 2004, a new attack against SHA-1 has been proposed by a team leaded by Wang [15]. The aim of this article5 is to sophisticate and improve Wang’s attack by using algebraic tech...
Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hi...
90
Voted
IMA
2007
Springer
89views Cryptology» more  IMA 2007»
15 years 8 months ago
Cryptanalysis of the EPBC Authenticated Encryption Mode
Chris J. Mitchell