Preimages for Reduced-Round Tiger (English)
- New search for: Indesteege, Sebastiaan
- New search for: Preneel, Bart
- New search for: Lucks, Stefan
- New search for: Sadeghi, Ahmad-Reza
- New search for: Wolf, Christopher
- New search for: Indesteege, Sebastiaan
- New search for: Preneel, Bart
In:
Research in Cryptology
: Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers
;
Chapter: 8
;
90-99
;
2008
- Article/Chapter (Book) / Electronic Resource
-
Title:Preimages for Reduced-Round Tiger
-
Contributors:Lucks, Stefan ( editor ) / Sadeghi, Ahmad-Reza ( editor ) / Wolf, Christopher ( editor ) / Indesteege, Sebastiaan ( author ) / Preneel, Bart ( author )
-
Conference:Western European Workshop on Research in Cryptology ; 2007 ; Bochum, Germany
-
Published in:Research in Cryptology : Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers ; Chapter: 8 ; 90-99Lecture Notes in Computer Science ; 4945 ; 90-99
-
Publisher:
- New search for: Springer Berlin Heidelberg
-
Place of publication:Berlin, Heidelberg
-
Publication date:2008-01-01
-
Size:10 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent ServicesYoshida, Rei / Shigetomi, Rie / Yoshizoe, Kazuki / Otsuka, Akira / Imai, Hideki et al. | 2008
- 2
-
The GPS Identification Scheme Using Frobenius ExpansionsBenits, Waldyr D. / Galbraith, Steven D. et al. | 2008
- 3
-
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256Hölbl, Marko / Rechberger, Christian / Welzer, Tatjana et al. | 2008
- 4
-
Efficient Hash Collision Search Strategies on Special-Purpose HardwareGüneysu, Tim / Paar, Christof / Schäge, Sven et al. | 2008
- 5
-
Cryptography Based on Quadratic Forms: Complexity ConsiderationsHartung, Rupert J. et al. | 2008
- 6
-
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature SchemeDallot, Léonard et al. | 2008
- 7
-
Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism GroupsKorsten, Anja et al. | 2008
- 8
-
Preimages for Reduced-Round TigerIndesteege, Sebastiaan / Preneel, Bart et al. | 2008
- 9
-
Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known PlaintextsCourtois, Nicolas T. / Debraize, Blandine et al. | 2008
- 10
-
Combiner Driven Management Models and Their ApplicationsBeiter, Michael et al. | 2008
- 11
-
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-BSekar, Gautham / Paul, Souradyuti / Preneel, Bart et al. | 2008
- 12
-
Cryptanalysis of Achterbahn-128/80 with a New Keystream LimitationNaya-Plasencia, María et al. | 2008