[PDF][PDF] Cipher and hash function design strategies based on linear and differential cryptanalysis

J Daemen - 1995 - cs.ru.nl
This thesis contains a new approach to design block ciphers, synchronous and self-
synchronizing stream ciphers and cryptographic hash functions. The goal of this approach is …

[PDF][PDF] Cryptographic hash functions: A survey

S Bakhtiari, R Safavi-Naini, J Pieprzyk - 1995 - Citeseer
This paper gives a survey on cryptographic hash functions. It gives an overview of all types
of hash functions and reviews design principals and possible methods of attacks. It also …

Semi-bent functions

S Chee, S Lee, K Kim - Advances in Cryptology—ASIACRYPT'94: 4th …, 1995 - Springer
Highly nonlinear balanced Boolean functions both satisfying the propagation criterion and
having almost uniform correlation values with all linear functions are very important in the …

Keyed hash functions

S Bakhtiari, R Safavi-Naini, J Pieprzyk - International Conference on …, 1995 - Springer
We give a new definition of keyed hash functions and show its relation with strongly
universal hash functions and Cartesian authentication codes. We propose an algorithm for a …

A key-schedule weakness in SAFER K-64

LR Knudsen - Advances in Cryptology—CRYPT0'95: 15th Annual …, 1995 - Springer
In this paper we analyse SAFER K-64 and show a weakness in the key schedule. It has the
effect that for almost every key K, there exists at least one different key K*, such that for many …

[PDF][PDF] Block ciphers

MJB Robshaw - RSA Lab. LOCATION, 1995 - friedo.szm.com
This technical report provides a review of the design and analysis of block ciphers. Its format
is built around the twin ideas of design and cryptanalysis and with this in mind we present …

New potentially 'weak'keys for DES amd LOK

LR Knudsen - Advances in Cryptology—EUROCRYPT'94: Workshop …, 1995 - Springer
New potentially ‘weak’ keys for DES amd LOK Page 1 New Potentially 'Weak
' Keys for DES amd LOK (Extended Abstract) Lars Ramkilde Knudsen ~rhus University …

[PDF][PDF] Practical and secure message authentication

S Bakhtiari, R Safavi-Naini… - Proc. Second Annual …, 1995 - sacworkshop.org
Use of encryption algorithms in message authentication is replaced by secure hash
functions which are often faster than encryption algorithms. Tsudik [14] has proposed three …

Prepaid electronic cheques using public-key certificates

C Radu, R Govaerts, J Vandewalle - Cryptography and Coding: 5th IMA …, 1995 - Springer
An electronic payment system which emulates the payments relying on classical cheques is
presented. Its main features are a high computational efficiency and low storage …

[PDF][PDF] Practical Message Authentication Schemes

S Bakhtiari, R Safavi-Naini, J Pieprzyk - 1995 - Citeseer
Use of encryption algorithms in message authentication is replaced by secure hash
functions which are often faster than encryption algorithms. Tsudik 14] has proposed three …