Zobrazeno 1 - 10
of 15
pro vyhledávání: '"Pouyan Sepehrdad"'
Publikováno v:
Journal of Cryptology. 28:240-256
Many modern block ciphers use maximum distance separable (MDS) matrices as the main part of their diffusion layers. In this paper, we propose a very efficient new class of diffusion layers constructed from several rounds of Feistel-like structures wh
Publikováno v:
SECRYPT
There are two major families in cryptanalytic attacks on symmetric ciphers: statistical attacks and algebraic attacks. In this position paper we argue that algebraic cryptanalysis has not yet been developed properly due to the weakness of the theory
On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations
Publikováno v:
Information Security and Privacy ISBN: 9783319083438
ACISP
ACISP
The best way of selecting samples in algebraic attacks against block ciphers is not well explored and understood. We introduce a simple strategy for selecting the plaintexts and demonstrate its strength by breaking reduced-round KATAN32 and LBlock. I
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4ca61fdc361099366abdf633bbd2b667
https://doi.org/10.1007/978-3-319-08344-5_4
https://doi.org/10.1007/978-3-319-08344-5_4
Publikováno v:
Fast Software Encryption ISBN: 9783662439326
FSE
FSE
In this paper, we report extremely fast and optimised active and passive attacks against the old IEEE 802.11 wireless communication protocol WEP. This was achieved through a huge amount of theoretical and experimental analysis (capturing WiFi packets
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::521a8f795f84860b903d1feec7fd5041
https://doi.org/10.1007/978-3-662-43933-3_9
https://doi.org/10.1007/978-3-662-43933-3_9
Publikováno v:
SECRYPT
Recently, two families of ultra-lightweight block ciphers were proposed, SIMON and SPECK, which come in a variety of block and key sizes (Beaulieu et al., 2013). They are designed to offer excellent performance for hardware and software implementatio
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8090d99e02b2237d319fc0b1960cdead
Publikováno v:
Fast Software Encryption ISBN: 9783642340468
FSE
FSE
Many modern block ciphers use maximum distance separable (MDS) matrices as the main part of their diffusion layers. In this paper, we propose a new class of diffusion layers constructed from several rounds of Feistel-like structures whose round funct
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::17ce5151dd2f686e9f5c04e68d8efefd
https://doi.org/10.1007/978-3-642-34047-5_22
https://doi.org/10.1007/978-3-642-34047-5_22
Publikováno v:
Fast Software Encryption ISBN: 9783642340468
FSE
FSE
ElimLin is a simple algorithm for solving polynomial systems of multivariate equations over small finite fields. It was initially proposed as a single tool by Courtois to attack DES. It can reveal some hidden linear equations existing in the ideal ge
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e7c6c22ffee4f28e55130e07df55b977
https://doi.org/10.1007/978-3-642-34047-5_18
https://doi.org/10.1007/978-3-642-34047-5_18
Publikováno v:
Advances in Cryptology – EUROCRYPT 2011 ISBN: 9783642204647
EUROCRYPT
EUROCRYPT
In this paper we construct several tools for manipulating pools of biases in the analysis of RC4. Then, we show that optimized strategies can break WEP based on 4000 packets by assuming that the first bytes of plaintext are known for each packet. We
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::15f45d39e32d1759aac945d9299d404b
https://doi.org/10.1007/978-3-642-20465-4_20
https://doi.org/10.1007/978-3-642-20465-4_20
Publikováno v:
Lecture Notes in Computer Science
Smart Card Research and Advanced Applications ISBN: 9783642272561
CARDIS
Smart Card Research and Advanced Applications ISBN: 9783642272561
CARDIS
Part 3: New Algorithms and Protocols; International audience; The ARMADILLO cryptographic primitive is a multi-purpose cryptographic primitive for RFID devices proposed at CHES’10. The main purpose of the primitive is to provide a secure authentica
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::476f317a551ce9f79ad126f7d81aeac2
Publikováno v:
Selected Areas in Cryptography ISBN: 9783642195730
Selected Areas in Cryptography
Selected Areas in Cryptography
In this paper, we present several weaknesses in the stream cipher RC4. First, we present a technique to automatically reveal linear correlations in the PRGA of RC4. With this method, 48 new exploitable correlations have been discovered. Then we bind
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8dfb285408b91c85b4958fdaa7969cb1
https://doi.org/10.1007/978-3-642-19574-7_5
https://doi.org/10.1007/978-3-642-19574-7_5