International Association for Cryptologic Research

International Association
for Cryptologic Research

IACR Local Search

Possible queries include homomorphic author:david.
Found 30000 results
Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=25063
Hongbo Yu Jiazhe Chen Xiaoyun Wang
Fse 2013
Near-Collision Attack on the Step-Reduced Compression Function of Skein-256
Eprint
https://eprint.iacr.org/2011/148
Hongbo Yu Jiazhe Chen Ketingjia Xiaoyun Wang
The Hash function Skein is one of the 5 finalists of NIST SHA-3 competition. It is designed based on the threefish block cipher and it only uses three primitive operations: modular addition, rotation and bitwise XOR (ARX). In...
last revised 31 Mar 2011
IACR FSE 2013
https://iacr.org/archive/fse2013/fse2013-novideo.html
FSE 2013: Shiho Moriai (Ed.): Fast Software Encryption - 20th International Workshop - FSE 2013, Singapore, March 11-13, 2013, Proceedings. FSE 2013 Preface by Shiho Moriai (Ed.): Organizational Committee Program Chairs :...
IACR FSE 2013
https://iacr.org/archive/fse2013/fse2013-index.html
FSE 2013: Shiho Moriai (Ed.): Fast Software Encryption - 20th International Workshop - FSE 2013, Singapore, March 11-13, 2013, Proceedings. FSE 2013 Preface by Shiho Moriai (Ed.): Organizational Committee Program Chairs :...
The Boomerang Attacks on the Round-Reduced Skein-512
Eprint
https://eprint.iacr.org/2012/238
Hongbo Yu Jiazhe Chen XIaoyun Wang
The hash function Skein is one of the five finalists of the NIST SHA-3 competition;it is based on the block cipher Threefish which only uses three primitive operations: modular addition, rotation and bitwise XOR (ARX). This...
received 29 Apr 2012
Improved Boomerang Attacks on Round-Reduced SM3 and BLAKE-256
Eprint
https://eprint.iacr.org/2013/852
Dongxia Bai Hongbo Yu Gaoli Wang Xiaoyun Wang
In this paper we study the security of hash functions SM3 and BLAKE-256 against boomerang attack. SM3 is designed by X. Wang et al. and published by Chinese Commercial Cryptography Administration Office for the use of...
last revised 7 Apr 2015
Near-Collision Attack on the Compression Function of Dynamic SHA2
Eprint
https://eprint.iacr.org/2009/179
Hongbo Yu Xiaoyun Wang
In this paper, we present a near-collision attack on the compression functions of Dynamic SHA2 for all the output sizes. For the Dynamic SHA2-224/256, the complexity is about $2^{45}$ operations and for the Dynamic...
received 23 Apr 2009
Cryptanalysis of the Compression Function of SIMD
Eprint
https://eprint.iacr.org/2010/304
Hongbo Yu Xiaoyun Wang
SIMD is one of the second round candidates of the SHA-3 competition hosted by NIST. In this paper, we present some results on the compression function of SIMD 1.1 (the tweaked version) using the modular difference method. For...
received 20 May 2010
IACR FSE 2012
https://iacr.org/archive/fse2012/fse2012-index.html
FSE 2012: Anne Canteaut (Ed.): Fast Software Encryption - 19th International Workshop - FSE 2012, FSE 2012, Washington, DC, USA, March 19-21, 2012 Proceedings. FSE 2012 Washington, DC, USA, March 19-21, 2012 Preface by Anne...
IACR FSE 2016
https://iacr.org/archive/fse2016/fse2016-index.html
FSE 2016: Thomas Peyrin (Ed.): Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers Proceedings. FSE 2016 Preface by Thomas Peyrin (Ed.):...
MultiCollision Attack on the Compression Functions of MD4 and 3-Pass HAVAL
Eprint
https://eprint.iacr.org/2007/085
Hongbo Yu Xiaoyun Wang
In this paper, we present a new type of MultiCollision attack on the compression functions both of MD4 and 3-Pass HAVAL. For MD4, we utilize two feasible different collision differential paths to find a 4-collision with 2^{19}...
received 5 Mar 2007
Cryptanalysis of GOST R Hash Function
Eprint
https://eprint.iacr.org/2013/584
Zongyue Wang Hongbo Yu Xiaoyun Wang
GOST R is the hash function standard of Russia. This paper presents some cryptanalytic results on GOST R. Using the rebound attack technique, we achieve collision attacks on the reduced round compression function. Result on up...
received 10 Sep 2013
IACR FSE 2014
https://iacr.org/archive/fse2014/fse2014-index.html
FSE 2014: Christian Rechberger and Carlos Cid (Eds.): Fast Software Encryption - 20th International Workshop FSE 2014, London, United Kingdom, March 3-5, 2014 Proceedings. FSE 2014 Preface by Christian Rechberger and Carlos...
Author Index for IACR Fast Software Encryption (FSE) 2013
https://iacr.org/archive/fse2013/authors.html
Author Index for IACR Fast Software Encryption (FSE) 2013 Abed, Farzaneh , 524 Andreeva, Elena , 324 Bhattacharyya, Rishiraj , 283 Biryukov, Alex , 1 Blondeau, Céline , 65 Bogdanov, Andrey , 17 , 324 , 416 Boldyreva, Alexandra...
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256
Eprint
https://eprint.iacr.org/2011/017
Jiazhe Chen Keting Jia Hongbo Yu Xiaoyun Wang
Camellia is a block cipher selected as a standard by ISO/IEC, which has been analyzed by a number of cryptanalysts. In this paper, we propose several 6-round impossible differential paths of Camellia with the $FL/FL^{-1}$...
last revised 19 Jan 2011
Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques
Iacrpub
https://iacr.org/cryptodb/data/paper.php?pubkey=27810
Huaifeng Chen Xiaoyun Wang
Fse 2016
Improved Linear Hull Attack on Round-Reduced \textsc{Simon} with Dynamic Key-guessing Techniques
Eprint
https://eprint.iacr.org/2015/666
Huaifeng Chen Xiaoyun Wang
\textsc{Simon} is a lightweight block cipher family proposed by NSA in 2013. It has drawn many cryptanalysts' attention and varieties of cryptanalysis results have been published, including differential, linear, impossible...
last revised 18 Feb 2016
Rotational Rebound Attacks on Reduced Skein
Eprint
https://eprint.iacr.org/2010/538
Dmitry Khovratovich Ivica Nikolic Christian Rechberger
In this paper we combine the recent rotational cryptanalysis with the rebound attack, which results in the best cryptanalysis of Skein, a candidate for the SHA-3 competition. The rebound attack approach was so far only applied...
received 20 Oct 2010
FSE 2017 - International Conference on Fast Software Encryption 2017 - Tokyo, Japan
https://iacr.org/workshops/fse2017/program.html
FSE 2017 March 5-8, 2017 Tokyo, Japan 24th International Conference on Fast Software Encryption Home Event Call for Papers Program Committee/Editorial Board Paper Submission Program Accepted Papers Sponsors Contact...
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-guessing Techniques
Eprint
https://eprint.iacr.org/2016/066
Lingyue Qin Huaifeng Chen Xiaoyun Wang
Simeck is a new family of lightweight block ciphers proposed by Yang $et\ al.$ in CHES'15, which has efficient hardware implementation. In this paper, we find differentials with low hamming weight and high probability for...
last revised 27 Apr 2016
Next ►