Sciweavers

102
Voted
PAIRING
2007
Springer
130views Cryptology» more  PAIRING 2007»
15 years 9 months ago
Bilinear Groups of Composite Order
Dan Boneh
102
Voted
FSE
2007
Springer
155views Cryptology» more  FSE 2007»
15 years 9 months ago
Algebraic Immunity of S-Boxes and Augmented Functions
Simon Fischer 0002, Willi Meier
93
Voted
FSE
2007
Springer
140views Cryptology» more  FSE 2007»
15 years 9 months ago
An Analytical Model for Time-Driven Cache Attacks
Kris Tiri, Onur Aciiçmez, Michael Neve, Fle...
132
Voted
FSE
2007
Springer
192views Cryptology» more  FSE 2007»
15 years 9 months ago
Algebraic Cryptanalysis of 58-Round SHA-1
In 2004, a new attack against SHA-1 has been proposed by a team leaded by Wang [15]. The aim of this article5 is to sophisticate and improve Wang’s attack by using algebraic tech...
Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hi...
93
Voted
FSE
2007
Springer
152views Cryptology» more  FSE 2007»
15 years 9 months ago
The 128-Bit Blockcipher CLEFIA (Extended Abstract)
Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shih...
FSE
2007
Springer
104views Cryptology» more  FSE 2007»
15 years 9 months ago
Security Analysis of Constructions Combining FIL Random Oracles
Yannick Seurin, Thomas Peyrin
97
Voted
FSE
2007
Springer
144views Cryptology» more  FSE 2007»
15 years 9 months ago
New Message Difference for MD4
Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro
114
Voted
FSE
2007
Springer
104views Cryptology» more  FSE 2007»
15 years 9 months ago
How to Enrich the Message Space of a Cipher
Abstract. Given (deterministic) ciphers E and E that can encipher messages of l and n bits, respectively, we construct a cipher E∗ = XLS[E, E] that can encipher messages of l + s...
Thomas Ristenpart, Phillip Rogaway
117
Voted
FSE
2007
Springer
114views Cryptology» more  FSE 2007»
15 years 9 months ago
Cryptanalysis of Achterbahn-128/80
María Naya-Plasencia
FSE
2007
Springer
105views Cryptology» more  FSE 2007»
15 years 9 months ago
New Bounds for PMAC, TMAC, and XCBC
We provide new security proofs for PMAC, TMAC, and XCBC message authentication modes. The previous security bounds for these modes were σ2 /2n , where n is the block size in bits ...
Kazuhiko Minematsu, Toshiyasu Matsushima