Sciweavers

2386 search results - page 230 / 478
» Database Security 2000
Sort
View
86
Voted
EUROCRYPT
2000
Springer
15 years 2 months ago
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations
The security of many recently proposed cryptosystems is based on the difficulty of solving large systems of quadratic multivariate polynomial equations. This problem is NP-hard ove...
Nicolas Courtois, Alexander Klimov, Jacques Patari...
89
Voted
EUROCRYPT
2000
Springer
15 years 2 months ago
Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free
One of the basic problems in cryptography is the generation of a common secret key between two parties, for instance in order to communicate privately. In this paper we consider in...
Ueli M. Maurer, Stefan Wolf
76
Voted
FSE
2000
Springer
80views Cryptology» more  FSE 2000»
15 years 2 months ago
Stochastic Cryptanalysis of Crypton
Abstract. Crypton is a 12-round blockcipher proposed as an AES candidate by C.H. Lim in 1998. In this paper, we show how to exploit some statistical deficiencies of the Crypton rou...
Marine Minier, Henri Gilbert
60
Voted
INFORMATICALT
2000
81views more  INFORMATICALT 2000»
14 years 10 months ago
A New Redundancy Reducing Cipher
This paper discusses a known-plaintext attack on a redundancy reducing cipher method which is proposed by Wayner. We also propose an extension of Wayner's redundancy reducing ...
Min-Shiang Hwang
103
Voted
INFORMATICASI
2002
128views more  INFORMATICASI 2002»
14 years 10 months ago
Cryptanalysis of Some Hash Functions Based on Block Ciphers and Codes
At PKC 2000, Inoue and Sakurai proposed some methods to design hash functions from block ciphers and codes (block codes and convolutional codes). They claimed that their hash func...
Hongjun Wu, Feng Bao, Robert H. Deng