Sciweavers

28 search results - page 3 / 6
» fse 2008
Sort
View
FSE
2008
Springer
166views Cryptology» more  FSE 2008»
15 years 1 months ago
A Meet-in-the-Middle Attack on 8-Round AES
We present a 5-round distinguisher for AES. We exploit this distinguisher to develop a meet-in-the-middle attack on 7 rounds of AES192 and 8 rounds of AES-256. We also give a time-...
Hüseyin Demirci, Ali Aydin Selçuk
ICASSP
2008
IEEE
15 years 6 months ago
Joint optimization of transceivers with fractionally spaced equalizers
Abstract— In this paper we propose a method for joint optimization of transceivers with fractionally spaced equalization (FSE). We use the effective single-input multiple-output ...
Ching-Chih Weng, P. P. Vaidyanathan
FSE
2008
Springer
141views Cryptology» more  FSE 2008»
15 years 1 months ago
Collisions for Step-Reduced SHA-256
In this article we find collisions for step-reduced SHA-256. We develop a differential that holds with high probability if the message satisfies certain conditions. We solve the eq...
Ivica Nikolic, Alex Biryukov
FSE
2008
Springer
110views Cryptology» more  FSE 2008»
15 years 1 months ago
How to Encrypt with a Malicious Random Number Generator
Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving an adversary access to an oracle that encrypts a given message m using random coins that ...
Seny Kamara, Jonathan Katz
FSE
2008
Springer
105views Cryptology» more  FSE 2008»
15 years 1 months ago
An Improved Security Bound for HCTR
HCTR was proposed by Wang, Feng and Wu in 2005. It is a mode of operation which provides a tweakable strong pseudorandom permutation. Though HCTR is quite an efficient mode, the au...
Debrup Chakraborty, Mridul Nandi