Sciweavers

18 search results - page 4 / 4
» Guess-then-Meet-in-the-Middle Attacks on the KTANTAN Family ...
Sort
View
71
Voted
CRYPTO
2004
Springer
112views Cryptology» more  CRYPTO 2004»
15 years 3 months ago
Feistel Schemes and Bi-linear Cryptanalysis
Abstract. In this paper we introduce the method of bi-linear cryptanalysis (BLC), designed specifically to attack Feistel ciphers. It allows to construct periodic biased character...
Nicolas Courtois
93
Voted
CHES
2010
Springer
189views Cryptology» more  CHES 2010»
14 years 11 months ago
Quark: A Lightweight Hash
The need for lightweight (that is, compact, low-power, low-energy) cryptographic hash functions has been repeatedly expressed by application designers, notably for implementing RFI...
Jean-Philippe Aumasson, Luca Henzen, Willi Meier, ...
97
Voted
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
14 years 11 months ago
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation
Hash functions are an important building block in almost all security applications. In the past few years, there have been major advances in the cryptanalysis of hash functions, es...
Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee