SHACAL

Results: 14



#Item
1Amplified Boomerang Attack Against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies(CIST), Korea University, Anam Dong, S

Amplified Boomerang Attack Against Reduced-Round SHACAL Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee, and Seokwon Jung Center for Information Security Technologies(CIST), Korea University, Anam Dong, S

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2007-08-31 13:50:35
    2improved_analysis_of_Shamata-BC.dvi

    improved_analysis_of_Shamata-BC.dvi

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-12-04 03:59:47
    3Cryptanalysis of SPEED Chris Hall1 , John Kelsey1 , Vincent Rijmen2 , Bruce Schneier1 , and David Wagner3 1 2

    Cryptanalysis of SPEED Chris Hall1 , John Kelsey1 , Vincent Rijmen2 , Bruce Schneier1 , and David Wagner3 1 2

    Add to Reading List

    Source URL: www.schneier.com

    Language: English - Date: 2014-03-02 23:18:31
    4Some Observations on SHAMATA Ewan Fleischmann and Michael Gorski Bauhaus-University Weimar, Germany {Ewan.Fleischman, Michael.Gorski}@uni-weimar.de  Abstract. In this note we discuss some observation of the SHA-3 candida

    Some Observations on SHAMATA Ewan Fleischmann and Michael Gorski Bauhaus-University Weimar, Germany {Ewan.Fleischman, Michael.Gorski}@uni-weimar.de Abstract. In this note we discuss some observation of the SHA-3 candida

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-11-27 07:11:39
    5KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee  Combined Differential, Linear and Related-Key Attacks

    KATHOLIEKE UNIVERSITEIT LEUVEN FACULTEIT INGENIEURSWETENSCHAPPEN DEPARTEMENT ELEKTROTECHNIEK–ESAT Kasteelpark Arenberg 10, 3001 Leuven-Heverlee Combined Differential, Linear and Related-Key Attacks

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2006-11-28 12:43:02
    6Cryptographic Hash Workshop[removed]Some applications of the Biham-Chen attack to SHA-like hash functions

    Cryptographic Hash Workshop[removed]Some applications of the Biham-Chen attack to SHA-like hash functions

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-06-20 11:28:42
    7Cryptographic Hash Workshop

    Cryptographic Hash Workshop

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2012-06-20 08:23:24
    8Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA Aleksandar Kircanski 1495E 28th St, 4B, Brooklyn, NY, 11229, US  Abstract

    Analysis of Boomerang Differential Trails via a SAT-Based Constraint Solver URSA Aleksandar Kircanski 1495E 28th St, 4B, Brooklyn, NY, 11229, US Abstract

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-07-18 13:28:11
    9Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI

    Design and Analysis of Block Cipher with Variable Word-Size Based on Dedicated Hash Functions: SHACAL-V Yong-Sork HER*, Kouichi SAKURAI

    Add to Reading List

    Source URL: ccc.ustc.edu.cn

    Language: English - Date: 2006-10-24 07:55:02
    10Portfolio of recommended cryptographic primitives NESSIE consortium? February 27, 2003 1

    Portfolio of recommended cryptographic primitives NESSIE consortium? February 27, 2003 1

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English - Date: 2003-02-22 15:34:08