Security of two-party identity-based key agreement

C Boyd, KKR Choo - International conference on cryptology in Malaysia, 2005 - Springer
Identity-based cryptography has become extremely fashionable in the last few years. As a
consequence many proposals for identity-based key establishment have emerged, the …

[PDF][PDF] Cryptanalysis of block ciphers

J Lu - 2008 - repository.royalholloway.ac.uk
The block cipher is one of the most important primitives in modern cryptography, information
and network security; one of the primary purposes of such ciphers is to provide …

Related-key attack on the MD-64 block cipher suitable for pervasive computing environments

J Kang, K Jeong, SS Yeo, C Lee - 2012 26th International …, 2012 - ieeexplore.ieee.org
MD-64 is a 64-bit block cipher with a 128-bit secret key and is based on data-dependent
operations for the fast hardware performance. MD-64 is suitable to applications in resource …

Related-key differential attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b

C Lee, J Kim, S Hong, J Sung, S Lee - International Conference on …, 2005 - Springer
Data-dependent permutations (DDPs) which are very suitable for cheap hardware
implementations have been introduced as a cryptographic primitive. Cobra-S128 and Cobra …

Related-key differential attacks on Cobra-H64 and Cobra-H128

C Lee, J Kim, J Sung, S Hong, S Lee… - Cryptography and Coding …, 2005 - Springer
Abstract Cobra-H64 and Cobra-H128, which use data-dependent permutations as a main
cryptographic primitive, are 64-bit and 128-bit iterated block ciphers with 128-bit and 256-bit …

Related-key attacks on the full-round Cobra-F64a and Cobra-F64b

J Lu, C Lee, J Kim - Security and Cryptography for Networks: 5th …, 2006 - Springer
Cobra-F64a and Cobra-F64b, designed for firmware-oriented applications, are 64-bit Data-
dependent Permutation based block ciphers with 128 key bits, which consist of 16 and 20 …

Related-key amplified boomerang attacks on the full-round Eagle-64 and Eagle-128

K Jeong, C Lee, J Sung, S Hong, J Lim - Australasian Conference on …, 2007 - Springer
In this paper we show that the full-round Eagle-64 and Eagle-128 are vulnerable to the
related-key amplified boomerang attack. The attack on the full-round Eagle-64 requires 2 65 …

Distinguishing attack on SDDO-based block cipher BMD-128

J Kang, K Jeong, C Lee, S Hong - Ubiquitous Information Technologies …, 2014 - Springer
Abstract BMD-128 is a 128-bit block cipher with a 256-bit secret key and is based on
switchable data-dependent operations. By using these operators, this algorithm was …

[PDF][PDF] Related-Key Amplified Boomerang Attack on Full-Round MM-128

H Eom, B Seok, C Lee - HUMAN-CENTRIC COMPUTING AND …, 2023 - hcisj.com
Recently, the use of open platforms with various network functions and hardware interfaces
has been increasing in various fields such as the Internet of Things, smart buildings, and …

Cryptanalysis of the XO-64 Suitable for Wireless Systems

TSD Phuc, NN Xiong, C Lee - Wireless Personal Communications, 2017 - Springer
Data-dependent operations (DDOs) that were introduced by Moldovyan in 2003 (Moldovyan
in MMM-ACNS 2003, LNCS, 2776: 316–327, Springer, Heidelberg, 5; Moldovyan et al. in Int …