Skip to main content

and
  1. No Access

    Book and Conference Proceedings

    Research in Cryptology

    4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers

    Frederik Armknecht, Stefan Lucks in Lecture Notes in Computer Science (2012)

  2. No Access

    Chapter and Conference Paper

    \({\Gamma\mbox{-MAC}\lbrack H,P\rbrack}\) - A New Universal MAC Scheme

    In this paper, we introduce a new class of universal hash function families called almost regular universal (ε− ARU). Informally, an ε− ARU hash function family is almost universal, and additionally provides almo...

    Ewan Fleischmann, Christian Forler, Stefan Lucks in Research in Cryptology (2012)

  3. No Access

    Chapter and Conference Paper

    Security of Cyclic Double Block Length Hash Functions

    We provide a proof of security for a huge class of double block length hash function that we will call Cyclic-DM. Using this result, we are able to give a collision resistance bound for Abreast-DM, one of the old...

    Ewan Fleischmann, Michael Gorski, Stefan Lucks in Cryptography and Coding (2009)

  4. No Access

    Book and Conference Proceedings

    Research in Cryptology

    Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

    Stefan Lucks, Ahmad-Reza Sadeghi, Christopher Wolf in Lecture Notes in Computer Science (2008)

  5. No Access

    Chapter and Conference Paper

    Linearity of the AES Key Schedule

    The AES key schedule can almost be described as collection of 32 linear feedback shift registers LFSRs, working in parallel. This implies that for related keys, i.e., pairs of unknown keys with known differences,...

    Frederik Armknecht, Stefan Lucks in Advanced Encryption Standard – AES (2005)

  6. Chapter and Conference Paper

    Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive

    Helix is a high-speed stream cipher with a built-in MAC functionality. On a Pentium II CPU it is about twice as fast as Rijndael or Twofish, and comparable in speed to RC4. The overhead per encrypted/authentic...

    Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey in Fast Software Encryption (2003)