Sciweavers

386 search results - page 56 / 78
» The Block Cipher Rijndael
Sort
View
93
Voted
CTRSA
2004
Springer
87views Cryptology» more  CTRSA 2004»
15 years 7 months ago
Padding Oracle Attacks on the ISO CBC Mode Encryption Standard
Abstract. In [8] Vaudenay presented an attack on block cipher CBCmode encryption when a particular padding method is used. In this paper, we employ a similar approach to analyse th...
Kenneth G. Paterson, Arnold K. L. Yau
ASAP
2010
IEEE
171views Hardware» more  ASAP 2010»
15 years 2 months ago
General-purpose FPGA platform for efficient encryption and hashing
Many applications require protection of secret or sensitive information, from sensor nodes and embedded applications to large distributed systems. The confidentiality of data can b...
Jakub Szefer, Yu-Yuan Chen, Ruby B. Lee
128
Voted
CTRSA
2010
Springer
189views Cryptology» more  CTRSA 2010»
15 years 8 months ago
Linear Cryptanalysis of Reduced-Round PRESENT
Abstract. PRESENT is a hardware-oriented block cipher suitable for resource constrained environment. In this paper we analyze PRESENT by the multidimensional linear cryptanalysis m...
Joo Yeon Cho
86
Voted
ISW
2009
Springer
15 years 8 months ago
Nonce Generators and the Nonce Reset Problem
A nonce is a cryptographic input value which must never repeat within a given context. Nonces are important for the security of many cryptographic building blocks, such as stream c...
Erik Zenner
SACRYPT
2009
Springer
141views Cryptology» more  SACRYPT 2009»
15 years 8 months ago
Cryptanalysis of Dynamic SHA(2)
In this paper, we analyze the hash functions Dynamic SHA and Dynamic SHA2, which have been selected as first round candidates in the NIST hash function competition. These hash fun...
Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan ...