Sciweavers

176 search results - page 3 / 36
» Distinguishing Attacks on T-Functions
Sort
View
CRYPTO
2009
Springer
111views Cryptology» more  CRYPTO 2009»
14 years 26 days ago
Distinguisher and Related-Key Attack on the Full AES-256
Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic
FSE
2005
Springer
117views Cryptology» more  FSE 2005»
13 years 11 months ago
A New Distinguisher for Clock Controlled Stream Ciphers
In this paper we present a distinguisher targeting towards irregularly clocked filter generators. The attack is applied on the irregularly clocked stream cipher called LILI-II. LI...
Håkan Englund, Thomas Johansson
SECON
2007
IEEE
14 years 16 days ago
Distinguishing Data Transience from False Injection in Sensor Networks
— Wireless sensor networks are increasingly being employed for potentially hazardous and critical applications such as monitoring the gas concentration levels in a battle field....
Vinod Shukla, Daji Qiao
IPL
2011
130views more  IPL 2011»
13 years 1 months ago
On the cryptanalysis of the hash function Fugue: Partitioning and inside-out distinguishers
Fugue is an intriguing hash function design with a novel shift-register based compression structure and has formal security proofs e.g. against collision attacks. In this paper, w...
Jean-Philippe Aumasson, Raphael C.-W. Phan
FSE
2006
Springer
124views Cryptology» more  FSE 2006»
13 years 10 months ago
Improved Linear Distinguishers for SNOW 2.0
In this paper we present new and more accurate estimates of the biases of the linear approximation of the FSM of the stream cipher SNOW 2.0. Based on improved bias estimates we als...
Kaisa Nyberg, Johan Wallén