[HTML][HTML] Finding nonnormal bent functions

A Canteaut, M Daum, H Dobbertin… - Discrete Applied …, 2006 - Elsevier
The question if there exist nonnormal bent functions was an open question for several years.
A Boolean function in n variables is called normal if there exists an affine subspace of …

Hyper-bent functions and cyclic codes

C Carlet, P Gaborit - Journal of Combinatorial Theory, Series A, 2006 - Elsevier
Bent functions are those Boolean functions whose Hamming distance to the Reed–Muller
code of order 1 equal 2n-1-2n/2-1 (where the number n of variables is even). These …

Breaking the ICE–finding multicollisions in iterated concatenated and expanded (ICE) hash functions

JJ Hoch, A Shamir - Fast Software Encryption: 13th International Workshop …, 2006 - Springer
The security of hash functions has recently become one of the hottest topics in the design
and analysis of cryptographic primitives. Since almost all the hash functions used today …

A new authentication mechanism and key agreement protocol for sip using identity-based cryptography

J Ring, K Choo, E Foo, M Looi - Proceedings of the AusCERT …, 2006 - eprints.qut.edu.au
The Session Initiation Protocol (SIP) protocol is commonly used to establish Voice over IP
(VoIP) calls. IETF SIP standards do not specify a secure authentication process thus …

A Walsh exploration of elementary CA rules

B Martin - International Workshop on Cellular Automata, 2006 - hal.science
In this paper, we explore the 256 elementary cellular automata rules by a Walsh transform in
order to find out correlation-immune rules for generating good pseudo-random sequences …

Constructing secure hash functions by enhancing Merkle-Damgård construction

P Gauravaram, W Millan, E Dawson… - Information Security and …, 2006 - Springer
Recently multi-block collision attacks (MBCA) were found on the Merkle-Damgård (MD)-
structure based hash functions MD5, SHA-0 and SHA-1. In this paper, we introduce a new …

Key establishment: Proofs and refutations

KKR Choo - 2006 - eprints.qut.edu.au
We study the problem of secure key establishment. We critically examine the security
models of Bellare and Rogaway (1993) and Canetti and Krawczyk (2001) in the …

The impact of carries on the complexity of collision attacks on SHA-1

F Mendel, N Pramstaller, C Rechberger… - Fast Software Encryption …, 2006 - Springer
In this article we present a detailed analysis of the impact of carries on the estimation of the
attack complexity for SHA-1. We build up on existing estimates and refine them. We show …

Combining compression functions and block cipher-based hash functions

T Peyrin, H Gilbert, F Muller, M Robshaw - Advances in Cryptology …, 2006 - Springer
The design of secure compression functions is of vital importance to hash function
development. In this paper we consider the problem of combining smaller trusted …

Modern şifreleme yöntemlerinin gücünün incelenmesi

MT Sakallı - 2006 - dspace.trakya.edu.tr
Özet Bu tez, simetrik kriptografinin en önemli iki yapısı olan blok ve akış şifreleri ile ilgilidir.
Blok ve akış şifrelerinin en önemli yapıları Boolean fonksiyonları ve vektöryel Boolean …