نتایج جستجو برای: mutamid 256

تعداد نتایج: 12691  

Journal: :IACR Cryptology ePrint Archive 2010
Yun-qiang Li Ai-lan Wang

Hamsi is one of 14 remaining candidates in NIST's Hash Competition for the future hash standard SHA3 and Hamsi-256 is one of four kinds of Hamsi. In this paper we present a genetic algorithm to search near collisions for the compress function of Hamsi-256 , give a near collision on (256 − 20) bits and a near collision on (256 − 21) bits with four differences in the chaining value, and obtain a ...

Journal: :The Journal of the Institute of Image Information and Television Engineers 1999

Journal: :IACR Cryptology ePrint Archive 2010
Junko Takahashi Toshinori Fukunaga

This paper describes a differential fault analysis (DFA) on AES with 192 and 256-bit keys. We show a new attack in which both 192 and 256-bit keys are retrieved within a feasible computational time. In order to verify the proposed attack and estimate the calculation time, we implement the proposed attack using C code on a PC. As a result, we successfully recover the original 192-bit key using 3...

2000
Niels Ferguson John Kelsey Stefan Lucks Bruce Schneier Michael Stay David A. Wagner Doug Whiting

We improve the best attack on Rijndael reduced to 6 rounds from complexity 2 to 2. We also present the first known attacks on 7and 8-round Rijndael. The attacks on 8-round Rijndael work for 192bit and 256-bit keys. Finally, we discuss the key schedule of Rijndael and describe a related-key attack that can break 9-round Rijndael with 256-bit keys.

2011
Praveen Gauravaram Lars R. Knudsen Nasour Bagheri Lei Wei Shahid Rajaee

Fugue is a cryptographic hash function designed by Halevi, Hall and Jutla and was one of the fourteen hash algorithms of the second round of NIST’s SHA3 hash competition. We consider Fugue-256, the 256-bit instance of Fugue. Fugue-256 updates a state of 960 bits with a round transformation R parametrized by a 32-bit message word. Twice in every state update, this transform invokes an AES like r...

2009
Gautham Sekar Bart Preneel

The software-efficient stream cipher HC-256 was proposed by Wu at FSE 2004. Due to its impressive performance, the cipher was also a well-received entrant to the ECRYPT eSTREAM competition. The closely related stream cipher HC-128, also designed by Wu, went on to find a place in the final portfolio of the eSTREAM contest. The cipher HC-256 is word-oriented, with 32 bits in each word, and uses a...

Journal: :Bulletin of the Australian Mathematical Society 1989

Journal: :Crítica (México D. F. En línea) 1979

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید