×

Found 23 Documents (Results 1–23)

Differential cryptanalysis of SipHash. (English) Zbl 1382.94097

Joux, Antoine (ed.) et al., Selected areas in cryptography – SAC 2014. 21st international conference, Montreal, QC, Canada, August 14–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 165-182 (2014).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Improved differential cryptanalysis of round-reduced Speck. (English) Zbl 1382.94089

Joux, Antoine (ed.) et al., Selected areas in cryptography – SAC 2014. 21st international conference, Montreal, QC, Canada, August 14–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 147-164 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the practical security bound of GF-NLFSR structure with SPN round function. (English) Zbl 1368.94141

Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9–10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 40-54 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of Widea. (English) Zbl 1321.94073

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 39-51 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Relationships between CCZ and EA equivalence classes and corresponding code invariants. (English) Zbl 1337.94107

Schmidt, Kai-Uwe (ed.) et al., Sequences and their applications – SETA 2014. 8th international conference, Melbourne, VIC, Australia, November 24–28, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-12324-0/pbk; 978-3-319-12325-7/ebook). Lecture Notes in Computer Science 8865, 3-17 (2014).
MSC:  94B25 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers. (English) Zbl 1306.94093

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 158-178 (2014).
MSC:  94A60 90C11
PDFBibTeX XMLCite
Full Text: DOI

Differential and impossible differential related-key attacks on Hierocrypt-L1. (English) Zbl 1318.94082

Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 17-33 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential cryptanalysis and linear distinguisher of full-round zorro. (English) Zbl 1353.94077

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 308-323 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Links between truncated differential and multidimensional linear properties of block ciphers and underlying attack complexities. (English) Zbl 1332.94060

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 165-182 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Analysis of BLAKE2. (English) Zbl 1337.94038

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 402-423 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Automatic search for differential trails in ARX ciphers. (English) Zbl 1337.94025

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 227-250 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Filter Results by …

Document Type

all top 3

Main Field

all top 3

Software