Sciweavers

381 search results - page 51 / 77
» Tweakable Block Ciphers
Sort
View
TIT
2008
130views more  TIT 2008»
14 years 9 months ago
Improving the Lower Bound on the Higher Order Nonlinearity of Boolean Functions With Prescribed Algebraic Immunity
Abstract. The recent algebraic attacks have received a lot of attention in cryptographic literature. The algebraic immunity of a Boolean function quantifies its resistance to the s...
Sihem Mesnager
CRYPTO
2011
Springer
280views Cryptology» more  CRYPTO 2011»
13 years 9 months ago
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
At CHES 2010, the new block cipher PRINTcipher was presented as a light-weight encryption solution for printable circuits [15]. The best attack to date is a differential attack [1...
Gregor Leander, Mohamed Ahmed Abdelraheem, Hoda Al...
FSE
1997
Springer
280views Cryptology» more  FSE 1997»
15 years 1 months ago
New Block Encryption Algorithm MISTY
We propose secret-key cryptosystems MISTY1 and MISTY2, which are block ciphers with a 128-bit key, a 64-bit block and a variable number of rounds. MISTY is a generic name for MISTY...
Mitsuru Matsui
CHES
2001
Springer
59views Cryptology» more  CHES 2001»
15 years 2 months ago
Transparent Harddisk Encryption
This paper introduces a new block cipher, and discusses its security. Its design is optimized for high-bandwidth applications that do not have high requirements on key-schedule lat...
Thomas Pornin
103
Voted
FSE
1993
Springer
148views Cryptology» more  FSE 1993»
15 years 1 months ago
Design Principles for Dedicated Hash Functions
Abstract. Dedicated hash functions are cryptographically secure compression functions which are designed specifically for hashing. They intend to form a practical alternative for ...
Bart Preneel