Sciweavers

386 search results - page 57 / 78
» The Block Cipher Rijndael
Sort
View
CRYPTO
2004
Springer
86views Cryptology» more  CRYPTO 2004»
15 years 7 months ago
On Multiple Linear Approximations
In this paper we study the long standing problem of information extraction from multiple linear approximations. We develop a formal statistical framework for block cipher attacks b...
Alex Biryukov, Christophe De Cannière, Mich...
ASIACRYPT
1999
Springer
15 years 6 months ago
Equivalent Keys of HPC
This paper presents a weakness in the key schedule of the AES candidate HPC (Hasty Pudding Cipher). It is shown that for the HPC version with a 128-bit key, 1 in 256 keys is weak i...
Carl D'Halluin, Gert Bijnens, Bart Preneel, Vincen...
109
Voted
IACR
2011
209views more  IACR 2011»
14 years 1 months ago
Improved Attacks on Full GOST
GOST is a well known block cipher which was developed in the Soviet Union during the 1970’s as an alternative to the US-developed DES. In spite of considerable cryptanalytic eff...
Itai Dinur, Orr Dunkelman, Adi Shamir
121
Voted
FSE
2010
Springer
153views Cryptology» more  FSE 2010»
15 years 6 months ago
Rotational Cryptanalysis of ARX
In this paper we analyze the security of systems based on modular additions, rotations, and XORs (ARX systems). We provide both theoretical support for their security and practical...
Dmitry Khovratovich, Ivica Nikolic
120
Voted
ACISP
2000
Springer
15 years 6 months ago
An Implementation of Bitsliced DES on the Pentium MMXTM Processor
In this paper we describe an implementation of the DES (and Triple-DES) algorithm using the bitslicing technique on an Intel Pentium MMX processor. Implementation specifics are di...
Lauren May, Lyta Penna, Andrew Clark