Sciweavers

713 search results - page 88 / 143
» Dispersing Hash Functions
Sort
View
ACNS
2009
Springer
193views Cryptology» more  ACNS 2009»
15 years 4 months ago
Cryptanalysis of Twister
In this paper, we present a pseudo-collision attack on the compression function of all Twister variants (224,256,384,512) with complexity of about 226.5 compression function evalua...
Florian Mendel, Christian Rechberger, Martin Schl&...
BMCBI
2008
171views more  BMCBI 2008»
14 years 10 months ago
Fuzzy association rules for biological data analysis: A case study on yeast
Background: Last years' mapping of diverse genomes has generated huge amounts of biological data which are currently dispersed through many databases. Integration of the info...
Francisco J. Lopez, Armando Blanco, Fernando Garci...
CRYPTO
2000
Springer
89views Cryptology» more  CRYPTO 2000»
15 years 2 months ago
On the Round Security of Symmetric-Key Cryptographic Primitives
We put forward a new model for understanding the security of symmetric-key primitives, such as block ciphers. The model captures the fact that many such primitives often consist of...
Zulfikar Ramzan, Leonid Reyzin
CHES
2010
Springer
175views Cryptology» more  CHES 2010»
14 years 11 months ago
Side-Channel Analysis of Six SHA-3 Candidates
Abstract. In this paper we study six 2nd round SHA-3 candidates from a side-channel cryptanalysis point of view. For each of them, we give the exact procedure and appropriate choic...
Olivier Benoît, Thomas Peyrin
ISW
2009
Springer
15 years 4 months ago
On Free-Start Collisions and Collisions for TIB3
In this paper, we present free-start collisions for the TIB3 hash function with a complexity of about 232 compression function evaluations. By using message modification technique...
Florian Mendel, Martin Schläffer