Skip to main content

and
  1. Chapter and Conference Paper

    Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations

    At CHES 2010, the new block cipher PRINTcipher was presented. In addition to using an xor round key as is common practice for round-based block ciphers, PRINTcipher also uses key-dependent permutations. While thi...

    Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner in Fast Software Encryption (2011)

  2. Chapter and Conference Paper

    Cryptanalysis of ARMADILLO2

    ARMADILLO2 is the recommended variant of a multipurpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper, we describe a meet-in-the-middle technique r...

    Mohamed Ahmed Abdelraheem, Céline Blondeau in Advances in Cryptology – ASIACRYPT 2011 (2011)

  3. No Access

    Chapter and Conference Paper

    Concrete Security for Entity Recognition: The Jane Doe Protocol

    Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns turns out to be very useful for low-end devices. The cur...

    Stefan Lucks, Erik Zenner, André Weimerskirch in Progress in Cryptology - INDOCRYPT 2008 (2008)

  4. No Access

    Chapter and Conference Paper

    On the Efficiency of the Clock Control Guessing Attack

    Many bitstream generators are based on linear feedback shift registers. A widespread technique for the cryptanalysis of those generators is the linear consistency test (LCT). In this paper, we consider an appl...

    Erik Zenner in Information Security and Cryptology — ICISC 2002 (2003)

  5. No Access

    Chapter and Conference Paper

    Improved Cryptanalysis of the Self-Shrinking Generator

    We propose a new attack on the self-shrinking generator [8]. The attack is based on a backtracking algorithm and will reconstruct the key from a short sequence of known keystream bits. We give both mathematical a...

    Erik Zenner, Matthias Krause, Stefan Lucks in Information Security and Privacy (2001)