International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 20000 results
Higher-Order Differential Meet-in-the-middle Preimage Attacks on SHA-1 and BLAKE
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=27345
Thomas Espitau Pierre-Alain Fouque Pierre Karpman
Crypto 2015
Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE
Eprint
https://eprint.iacr.org/2015/515
Thomas Espitau Pierre-Alain Fouque Pierre Karpman
At CRYPTO 2012, Knellwolf and Khovratovich presented a differential formulation of advanced meet-in-the-middle techniques for preimage attacks on hash functions. They demonstrated the usefulness of their approach by...
last revised 3 Jun 2015
IACR FSE 2011
https://iacr.org/archive/fse2011/fse2011-index.html
FSE 2011: Antoine Joux (Eds.): Fast Software Encryption - 18th International Workshop - FSE 2011, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers Proceedings. FSE 2011 Lyngby, Denmark, February 13-16,...
IACR CRYPTO 2015
https://iacr.org/archive/crypto2015/crypto2015-index.html
CRYPTO 2015: Matthew J. B. Robshaw and Rosario Gennaro (Eds.): Advances in Cryptology - CRYPTO 2015 35th Annual Cryptology Conference Santa Barbara, CA, USA, August 16-20, 2015, Proceedings CRYPTO 2015, Vol I. CRYPTO 2015,...
CRYPTO 2015
https://iacr.org/conferences/crypto2015/program.html
CRYPTO 2015 August 16-20, 2015 date Santa Barbara, CA, USA location Home Technical Program Call for Papers Paper Submissions Accepted Papers Program General Information Schedule Registration Travel Accommodations US Visa...
CRYPTO 2015
https://iacr.org/conferences/crypto2016/archive/program.html
CRYPTO 2015 August 16-20, 2015 date Santa Barbara, CA, USA location Home Technical Program Call for Papers Paper Submissions Accepted Papers Program General Information Schedule Registration Travel Accommodations US Visa...
CRYPTO 2015
https://iacr.org/conferences/eurocrypt2016/C-program.html
CRYPTO 2015 August 16-20, 2015 date Santa Barbara, CA, USA location Home Technical Program Call for Papers Paper Submissions Accepted Papers Program General Information Schedule Registration Travel Accommodations US Visa...
CRYPTO 2015
https://iacr.org/conferences/crypto2016/archive/bak_acceptedpapers.html
CRYPTO 2016 August 14-18, 2016 date Santa Barbara, CA, USA location Home Technical Program Call for Papers Paper Submissions Accepted Papers General Information Travel Accommodations US Visas Stipends Contact Information...
CRYPTO 2015
https://iacr.org/conferences/crypto2015/bak_acceptedpapers.html
CRYPTO 2015 August 16-20, 2015 date Santa Barbara, CA, USA location Home Technical Program Call for Papers Paper Submissions Accepted Papers Program General Information Schedule Registration Travel Accommodations US Visa...
CRYPTO 2015
https://iacr.org/conferences/crypto2015/acceptedpapers.html
CRYPTO 2015 August 16-20, 2015 date Santa Barbara, CA, USA location Home Technical Program Call for Papers Paper Submissions Accepted Papers Program General Information Schedule Registration Travel Accommodations US Visa...
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=27659
Patrick Derbez Pierre-Alain Fouque
Crypto 2016
Security Amplification against Meet-in-the-Middle Attacks Using Whitening
Eprint
https://eprint.iacr.org/2013/618
Pierre-Alain Fouque Pierre Karpman
In this paper we introduce a model for studying meet-in-the-middle attacks on block ciphers, and a simple block cipher construction provably resistant to such attacks in this model. A side-result of this is a proper...
last revised 26 Sep 2013
Meet-in-the-Middle and Impossible Differential Fault Analysis on AES
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=24071
Patrick Derbez Pierre-Alain Fouque Delphine Leresteux
Ches 2011
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=23912
Kazumaro Aoki Yu Sasaki
Crypto 2009
New Preimage Attacks Against Reduced SHA-1
Eprint
https://eprint.iacr.org/2012/440
Simon Knellwolf Dmitry Khovratovich
This paper shows preimage attacks against reduced SHA-1 up to 57 steps. The best previous attack has been presented at CRYPTO 2009 and was for 48 steps finding a two-block preimage with incorrect padding at the cost of 2159.3...
received 2 Aug 2012
Automatic Search of Meet-in-the-Middle and Impossible Differential Attacks
Eprint
https://eprint.iacr.org/2016/579
Patrick Derbez Pierre-Alain Fouque
Tracking bits through block ciphers and optimizing attacks at hand is one of the tedious task symmetric cryptanalysts have to deal with. It would be nice if a program will automatically handle them at least for well-known...
received 3 Jun 2016
CRYPTO 2012
https://iacr.org/conferences/crypto2012/abstracts/session6-3.html
CRYPTO 2012 Aug 19 – 23 Santa Barbara California USA CRYPTO 2012 Home > New Preimage Attacks Against Reduced SHA-1 Simon Knellwolf (ETH Zurich and FHNW, Switzerland ) Dmitry Khovratovich (Microsoft Research Redmond ) Abstract:...
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=25049
Patrick Derbez Pierre-Alain Fouque
Fse 2013
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks against Reduced-Round AES
Eprint
https://eprint.iacr.org/2015/259
Patrick Derbez Pierre-Alain Fouque
In this paper, we revisit Demirci and Selçuk meet-in-the-middle attacks on AES. We find a way to automatically model SPN block cipher and meet-in-the-middle attacks that allows to perform exhaustive search of this kind of...
received 19 Mar 2015
IACR ASIACRYPT 2014
https://iacr.org/archive/asiacrypt2014/asiacrypt2014-index.html
ASIACRYPT 2014: Palash Sarkar and Tetsu Iwata (Eds.): Advances in Cryptology - ASIACRYPT 2014 20th International Conference on the Theory and Application of Cryptology and Information Security Kaoshiung, Taiwan, R.O.C.,...
Next ►