Sciweavers

FSE
2004
Springer
108views Cryptology» more  FSE 2004»
15 years 2 months ago
Algebraic Attacks on Summation Generators
We apply the algebraic attacks on stream ciphers with memories to the summation generator. For a summation generator that uses n LFSRs, an algebraic equation relating the key strea...
Dong Hoon Lee 0002, Jaeheon Kim, Jin Hong, Jae Woo...
FSE
2004
Springer
117views Cryptology» more  FSE 2004»
15 years 2 months ago
CWC: A High-Performance Conventional Authenticated Encryption Mode
Tadayoshi Kohno, John Viega, Doug Whiting
FSE
2004
Springer
96views Cryptology» more  FSE 2004»
15 years 2 months ago
A New Stream Cipher HC-256
HC-256 is a software-efficient stream cipher. It generates keystream from a 256-bit secret key and a 256-bit initialization vector.
Hongjun Wu
FSE
2004
Springer
155views Cryptology» more  FSE 2004»
15 years 2 months ago
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering
This paper presents algebraic attacks on SOBER-t32 and SOBER-t16 without stuttering. For unstuttered SOBER-t32, two different attacks are implemented. In the first attack, we obt...
Joo Yeon Cho, Josef Pieprzyk
FSE
2004
Springer
130views Cryptology» more  FSE 2004»
15 years 2 months ago
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan
A cryptanalysis is given of a MAC proposal presented at CRYPTO 2003 by Cary and Venkatesan. A nice feature of the CaryVenkatesan MAC is that a lower bound on its security can be pr...
Simon R. Blackburn, Kenneth G. Paterson
FSE
2004
Springer
115views Cryptology» more  FSE 2004»
15 years 2 months ago
Correlation Attacks Using a New Class of Weak Feedback Polynomials
In 1985 Siegenthaler introduced the concept of correlation attacks on LFSR based stream ciphers. A few years later Meier and Staffelbach demonstrated a special technique, usually ...
Håkan Englund, Martin Hell, Thomas Johansson
FSE
2004
Springer
101views Cryptology» more  FSE 2004»
15 years 2 months ago
The EAX Mode of Operation
Mihir Bellare, Phillip Rogaway, David Wagner
FSE
2004
Springer
94views Cryptology» more  FSE 2004»
15 years 2 months ago
Improving Fast Algebraic Attacks
Frederik Armknecht
FSE
2004
Springer
90views Cryptology» more  FSE 2004»
15 years 2 months ago
Fast Software-Based Attacks on SecurID
SecurID is a widely used hardware token for strengthening authentication in a corporate environment. Recently, Biryukov, Lano, and Preneel presented an attack on the alleged SecurI...
Scott Contini, Yiqun Lisa Yin
FSE
2004
Springer
84views Cryptology» more  FSE 2004»
15 years 2 months ago
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines
We present a realization of an LFSM that utilizes an LFSR. This is based on a well-known fact from linear algebra. This structure is used to show that a previous attempt at using a...
Jin Hong, Dong Hoon Lee 0002, Seongtaek Chee, Pala...