Sciweavers

FSE
2010
Springer
140views Cryptology» more  FSE 2010»
15 years 3 months ago
Cryptanalysis of ESSENCE
ESSENCE is a hash function submitted to the NIST Hash Competition that stands out as a hardware-friendly and highly parallelizable design. Previous analysis showed some non-randomn...
María Naya-Plasencia, Andrea Röck, Jea...
FSE
2010
Springer
132views Cryptology» more  FSE 2010»
15 years 3 months ago
Attacking the Knudsen-Preneel Compression Functions
Onur Özen, Thomas Shrimpton, Martijn Stam
FSE
2010
Springer
144views Cryptology» more  FSE 2010»
15 years 3 months ago
Pseudo-cryptanalysis of the Original Blue Midnight Wish
The hash function Blue Midnight Wish (BMW) is a candidate in the SHA-3 competition organised by the U.S. National Institute of Standards and Technology (NIST). BMW was selected fo...
Søren S. Thomsen
87
Voted
FSE
2010
Springer
180views Cryptology» more  FSE 2010»
15 years 3 months ago
Fast Software AES Encryption
This paper presents new software speed records for AES-128 encryption for architectures at both ends of the performance spectrum. On the one side we target the low-end 8-bit AVR mi...
Dag Arne Osvik, Joppe W. Bos, Deian Stefan, David ...
63
Voted
FSE
2010
Springer
162views Cryptology» more  FSE 2010»
15 years 3 months ago
Differential and Invertibility Properties of BLAKE
Jean-Philippe Aumasson, Jian Guo, Simon Knellwolf,...
FSE
2010
Springer
127views Cryptology» more  FSE 2010»
15 years 3 months ago
Another Look at Complementation Properties
Charles Bouillaguet, Orr Dunkelman, Gaëtan Le...
65
Voted
FSE
2010
Springer
185views Cryptology» more  FSE 2010»
15 years 3 months ago
Cryptanalysis of the DECT Standard Cipher
Karsten Nohl, Erik Tews, Ralf-Philipp Weinmann