Skip to main content

and
  1. Chapter and Conference Paper

    Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations

    At CHES 2010, the new block cipher PRINTcipher was presented. In addition to using an xor round key as is common practice for round-based block ciphers, PRINTcipher also uses key-dependent permutations. While thi...

    Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner in Fast Software Encryption (2011)

  2. No Access

    Chapter and Conference Paper

    Cryptanalysis of the Light-Weight Cipher A2U2

    In recent years, light-weight cryptography has received a lot of attention. Many primitives suitable for resource-restricted hardware platforms have been proposed. In this paper, we present a cryptanalysis of ...

    Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner in Cryptography and Coding (2011)

  3. Chapter and Conference Paper

    Cryptanalysis of ARMADILLO2

    ARMADILLO2 is the recommended variant of a multipurpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper, we describe a meet-in-the-middle technique r...

    Mohamed Ahmed Abdelraheem, Céline Blondeau in Advances in Cryptology – ASIACRYPT 2011 (2011)

  4. No Access

    Chapter and Conference Paper

    Nonce Generators and the Nonce Reset Problem

    A nonce is a cryptographic input value which must never repeat within a given context. Nonces are important for the security of many cryptographic building blocks, such as stream ciphers, block cipher modes of...

    Erik Zenner in Information Security (2009)

  5. No Access

    Chapter and Conference Paper

    Concrete Security for Entity Recognition: The Jane Doe Protocol

    Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns turns out to be very useful for low-end devices. The cur...

    Stefan Lucks, Erik Zenner, André Weimerskirch in Progress in Cryptology - INDOCRYPT 2008 (2008)

  6. No Access

    Chapter and Conference Paper

    Improved Cryptanalysis of the Self-Shrinking Generator

    We propose a new attack on the self-shrinking generator [8]. The attack is based on a backtracking algorithm and will reconstruct the key from a short sequence of known keystream bits. We give both mathematical a...

    Erik Zenner, Matthias Krause, Stefan Lucks in Information Security and Privacy (2001)