Skip to main content

and
  1. Chapter and Conference Paper

    Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations

    At CHES 2010, the new block cipher PRINTcipher was presented. In addition to using an xor round key as is common practice for round-based block ciphers, PRINTcipher also uses key-dependent permutations. While thi...

    Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner in Fast Software Encryption (2011)

  2. No Access

    Chapter and Conference Paper

    Cryptanalysis of the Light-Weight Cipher A2U2

    In recent years, light-weight cryptography has received a lot of attention. Many primitives suitable for resource-restricted hardware platforms have been proposed. In this paper, we present a cryptanalysis of ...

    Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner in Cryptography and Coding (2011)

  3. Chapter and Conference Paper

    A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack

    At CHES 2010, the new block cipher PRINTcipher was presented as a light-weight encryption solution for printable circuits [15]. The best attack to date is a differential attack [1] that breaks less than half of t...

    Gregor Leander, Mohamed Ahmed Abdelraheem in Advances in Cryptology – CRYPTO 2011 (2011)

  4. Chapter and Conference Paper

    Cryptanalysis of ARMADILLO2

    ARMADILLO2 is the recommended variant of a multipurpose cryptographic primitive dedicated to hardware which has been proposed by Badel et al. in [1]. In this paper, we describe a meet-in-the-middle technique r...

    Mohamed Ahmed Abdelraheem, Céline Blondeau in Advances in Cryptology – ASIACRYPT 2011 (2011)

  5. Chapter and Conference Paper

    A Cache Timing Analysis of HC-256

    In this paper, we describe a cache-timing attack against the stream cipher HC-256, which is the strong version of eStream winner HC-128. The attack is based on an abstract model of cache timing attacks that ca...

    Erik Zenner in Selected Areas in Cryptography (2009)

  6. No Access

    Chapter and Conference Paper

    Cache Timing Analysis of LFSR-Based Stream Ciphers

    Cache timing attacks are a class of side-channel attacks that is applicable against certain software implementations. They have generated significant interest when demonstrated against the Advanced Encryption ...

    Gregor Leander, Erik Zenner, Philip Hawkes in Cryptography and Coding (2009)

  7. No Access

    Chapter and Conference Paper

    Concrete Security for Entity Recognition: The Jane Doe Protocol

    Entity recognition does not ask whether the message is from some entity X, just whether a message is from the same entity as a previous message. This turns turns out to be very useful for low-end devices. The cur...

    Stefan Lucks, Erik Zenner, André Weimerskirch in Progress in Cryptology - INDOCRYPT 2008 (2008)

  8. No Access

    Chapter and Conference Paper

    On the Efficiency of the Clock Control Guessing Attack

    Many bitstream generators are based on linear feedback shift registers. A widespread technique for the cryptanalysis of those generators is the linear consistency test (LCT). In this paper, we consider an appl...

    Erik Zenner in Information Security and Cryptology — ICISC 2002 (2003)