Sciweavers

28 search results - page 1 / 6
» Cryptography: all-out attacks or how to attack cryptography ...
Sort
View
VIROLOGY
2010
136views more  VIROLOGY 2010»
14 years 4 months ago
Cryptography: all-out attacks or how to attack cryptography without intensive cryptanalysis
Jean-Baptiste Bedrune, Eric Filiol, Fréd&ea...
FSE
2003
Springer
112views Cryptology» more  FSE 2003»
15 years 3 months ago
Cryptanalysis of SOBER-t32
Abstract. Sober-t32 is a candidate stream cipher in the NESSIE competition. Some new attacks are presented in this paper. A Guess and Determine attack is mounted against Sober-t32 ...
Steve Babbage, Christophe De Cannière, Jose...
IACR
2011
161views more  IACR 2011»
13 years 9 months ago
Roots of Square: Cryptanalysis of Double-Layer Square and Square+
Abstract. Square is a multivariate quadratic encryption scheme proposed in 2009. It is a specialization of Hidden Field Equations by using only odd characteristic elds and also X2...
Enrico Thomae, Christopher Wolf
FC
2005
Springer
109views Cryptology» more  FC 2005»
15 years 3 months ago
Fraud Within Asymmetric Multi-hop Cellular Networks
At Financial Cryptography 2003, Jakobsson, Hubaux, and Butty´an suggested a lightweight micro-payment scheme aimed at encouraging routing collaboration in asymmetric multi-hop cel...
Gildas Avoine
99
Voted
FSE
2009
Springer
472views Cryptology» more  FSE 2009»
15 years 10 months ago
Algebraic Techniques in Differential Cryptanalysis
In this paper we propose a new cryptanalytic method against block ciphers, which combines both algebraic and statistical techniques. More specifically, we show how to use algebraic...
Martin Albrecht, Carlos Cid