Zobrazeno 1 - 10
of 96
pro vyhledávání: '"Mario Lamberger"'
Publikováno v:
Journal of Cryptology. 28:257-296
We introduce the rebound attack as a variant of differential cryptanalysis on hash functions and apply it to the hash function Whirlpool, standardized by ISO/IEC. We give attacks on reduced variants of the 10-round Whirlpool hash function and compres
Publikováno v:
Designs, Codes and Cryptography. 62:1-18
We investigate generic methods to find near-collisions in cryptographic hash functions. We introduce a new generic approach based on methods to find cycles in the space of codewords of a code with low covering radius. We give an analysis of our appro
Publikováno v:
Computing. 85:85-104
In this paper we study the security of the Advanced Encryption Standard (AES) and AES-like block ciphers against differential cryptanalysis. Differential cryptanalysis is one of the most powerful methods for analyzing the security of block ciphers. E
Autor:
Mario Lamberger
Publikováno v:
Indagationes Mathematicae. 17:45-63
In the present paper we are investigating a certain point measure of a distribution function arising in a paper by Grabner et al. [Combinatorica 22 (2002) 245–267]. This distribution function is defined by means of the subtractive Euclidean algorit
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642349300
INDOCRYPT
INDOCRYPT
Hamsi-256 is a cryptographic hash functions submitted by Kucuk to the NIST SHA-3 competition in 2008. It was selected by NIST as one of the 14 round 2 candidates in 2009. Even though Hamsi-256 did not make it to the final round in 2010 it is still an
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::18882c58c494fcdaec3e493f66bfb849
https://doi.org/10.1007/978-3-642-34931-7_10
https://doi.org/10.1007/978-3-642-34931-7_10
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642253843
ASIACRYPT
17th International Conference on the Theory and Application of Cryptology and Information Security (pp. 270-287). Springer (2011).
ASIACRYPT
17th International Conference on the Theory and Application of Cryptology and Information Security (pp. 270-287). Springer (2011).
In this work, we introduce a new non-random property for hash/compression functions using the theory of higher order differentials. Based on this, we show a second-order differential collision for the compression function of SHA-256 reduced to 47 out
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5def3c9b995beec0f217c8992a2315ca
https://doi.org/10.1007/978-3-642-25385-0_15
https://doi.org/10.1007/978-3-642-25385-0_15
Autor:
Mario Lamberger, Vincent Rijmen
Publikováno v:
Selected Areas in Cryptography ISBN: 9783642195730
Selected Areas in Cryptography
Selected Areas in Cryptography
Recently, a new generic method to find near-collisions for cryptographic hash functions in a memoryless way has been proposed. This method is based on classical cycle-finding techniques and covering codes. This paper contributes to the coding theory
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8c3618908f33a1af46e5d386c1b05641
https://doi.org/10.1007/978-3-642-19574-7_13
https://doi.org/10.1007/978-3-642-19574-7_13
Publikováno v:
Advances in Cryptology – ASIACRYPT 2009 ISBN: 9783642103650
ASIACRYPT
ASIACRYPT
Whirlpool is a hash function based on a block cipher that can be seen as a scaled up variant of the AES. The main difference is the (compared to AES) extremely conservative key schedule. In this work, we present a distinguishing attack on the full co
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::fded0dedd06ba19ff9070b85b86d5d87
https://www.cosic.esat.kuleuven.be/publications/article-1374.pdf
https://www.cosic.esat.kuleuven.be/publications/article-1374.pdf
Publikováno v:
Journal of Mathematical Cryptology, Vol 3, Iss 3, Pp 249-263 (2009)
In this paper, we present an approach to apply numerical methods in the cryptanalysis of modern cryptographic algorithms. We focus on the stream cipher Trivium. It is a stream cipher recommended by the eStream project in the hardware category. We use
Autor:
Florian Mendel, Mario Lamberger
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783642044731
ISC
ISC
The recently started SHA-3 competition in order to find a new secure hash standard and thus a replacement for SHA-1/SHA-2 has attracted a lot of interest in the academic world as well as in industry. There are 51 round one candidates building on some
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::42711eccda4c19c1047a43bc5bc1a5d3
https://www.cosic.esat.kuleuven.be/publications/article-2095.pdf
https://www.cosic.esat.kuleuven.be/publications/article-2095.pdf