Sciweavers

2967 search results - page 520 / 594
» Cryptology
Sort
View
FSE
2007
Springer
103views Cryptology» more  FSE 2007»
15 years 3 months ago
Improved Slide Attacks
Abstract. The slide attack is applicable to ciphers that can be represented as an iterative application of the same keyed permutation. The slide attack leverages simple attacks on ...
Eli Biham, Orr Dunkelman, Nathan Keller
FSE
2007
Springer
116views Cryptology» more  FSE 2007»
15 years 3 months ago
Two General Attacks on Pomaranch-Like Keystream Generators
Two general attacks that can be applied to all versions and variants of the Pomaranch stream cipher are presented. The attacks are demonstrated on all versions and succeed with com...
Håkan Englund, Martin Hell, Thomas Johansson
FSE
2007
Springer
94views Cryptology» more  FSE 2007»
15 years 3 months ago
Overtaking VEST
VEST is a set of four stream cipher families submitted by S. O’Neil, B. Gittins and H. Landman to the eSTREAM call for stream cipher proposals of the European project ECRYPT. The...
Antoine Joux, Jean-René Reinhard
FSE
2007
Springer
250views Cryptology» more  FSE 2007»
15 years 3 months ago
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256
This paper examines the security of AES-192 and AES-256 against a related-key rectangle attack. We find the following new attacks: 8-round reduced AES-192 with 2 related keys, 10-...
Jongsung Kim, Seokhie Hong, Bart Preneel
FSE
2007
Springer
111views Cryptology» more  FSE 2007»
15 years 3 months ago
An Analysis of XSL Applied to BES
Abstract. Currently, the only plausible attack on the Advanced Encryption System (AES) is the XSL attack over F256 through the Big Encryption System (BES) embedding. In this paper,...
Chu-Wee Lim, Khoongming Khoo