Sciweavers

427 search results - page 34 / 86
» Cryptanalysis of the
Sort
View
AFRICACRYPT
2010
Springer
15 years 5 months ago
Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512
In this paper, we analyze the SHAvite-3-512 hash function, as proposed and tweaked for round 2 of the SHA-3 competition. We present cryptanalytic results on 10 out of 14 rounds of ...
Praveen Gauravaram, Gaëtan Leurent, Florian M...
FSE
2010
Springer
185views Cryptology» more  FSE 2010»
15 years 4 months ago
Cryptanalysis of the DECT Standard Cipher
Karsten Nohl, Erik Tews, Ralf-Philipp Weinmann
ACISP
2001
Springer
15 years 4 months ago
Improved Cryptanalysis of the Self-Shrinking Generator
Erik Zenner, Matthias Krause, Stefan Lucks
ASIACRYPT
2001
Springer
15 years 4 months ago
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001
Craig Gentry, Jakob Jonsson, Jacques Stern, Michae...
CCS
2001
ACM
15 years 4 months ago
A Cryptanalysis of the High-Bandwidth Digital Content Protection System
Abstract. We describe a weakness in the High Bandwidth Digital Content Protection (HDCP) scheme which may lead to practical attacks. HDCP is a proposed identity-based cryptosystem ...
Scott Crosby, Ian Goldberg, Robert Johnson, Dawn X...