Sciweavers

204 search results - page 10 / 41
» On the Interpolation Attacks on Block Ciphers
Sort
View
62
Voted
JOC
2006
64views more  JOC 2006»
14 years 9 months ago
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers
Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee,...
JISE
2000
43views more  JISE 2000»
14 years 9 months ago
The Block Cipher: SEA2 With Provable Resistance Against DC and LC Attacks
Shih-Hsu Chang, Fang-Hsuan Cheng, Wen-Hsing Hsu
CANS
2010
Springer
258views Cryptology» more  CANS 2010»
14 years 7 months ago
Cryptanalysis of Reduced-Round MIBS Block Cipher
Abstract. This paper presents the first independent and systematic linear, differential and impossible-differential (ID) cryptanalyses of MIBS, a lightweight block cipher aimed at ...
Asli Bay, Jorge Nakahara, Serge Vaudenay
FSE
2000
Springer
153views Cryptology» more  FSE 2000»
15 years 1 months ago
Bitslice Ciphers and Power Analysis Attacks
In this paper, we present techniques to protect bitslice block ciphers against power analysis attacks. We analyze and extend a technique proposed in [14]. We apply the technique to...
Joan Daemen, Michael Peeters, Gilles Van Assche
FSE
2011
Springer
268views Cryptology» more  FSE 2011»
14 years 1 months ago
Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes
At Eurocrypt 2001, Biryukov and Shamir investigated the security of AES-like ciphers where the substitutions and affine transformations are all key-dependent and successfully crypt...
Julia Borghoff, Lars R. Knudsen, Gregor Leander, S...