Skip to main content
ABSTRACT Normally, it has been believed that the initial values of cryptographic schemes do not need to be managed secretly unlike the secret keys. However, we show that multiple modes of operation of block ciphers can suffer a loss of... more
    • by  and +1
    •   2  
      Pure MathematicsNumerical Analysis and Computational Mathematics
With chosen-IV chosen texts, David Wagner has analyzed the multiple modes of operation proposed by Eli Biham in FSE'98. However, his method is too unrealistic. We use only known-IV chosen texts to attack many triple modes of operation... more
    • by  and +1
    • Block Cipher
We examine the diffusion layers of some block ciphers referred to as substitution-permutation networks. We investigate the practical and provable security of these diffusion layers against differential and linear cryptanalysis. First, in... more
    • by  and +1
    •   5  
      Information SystemsProvable SecurityLinear CryptanalysisBlock Cipher
RSA-CRT is a widely used algorithm that provides high performance implementation of the RSA-signature algorithm. Many previous studies on each operation step have been published to verify the physical leakages of RSA-CRT when used in... more
    • by 
Within the security architecture of the 3GPP system there is a standardised encryption mode f 8 based on the block cipher KASUMI. In this work we examine the pseudorandomness of the block cipher KA-SUMI and the provable security of f 8.... more
    • by 
    •   3  
      Provable SecurityBlock CipherSecurity Architecture
First, injective modules are one of the most popular objects in homological algebra. In most cases, base rings are commutative and Noetherian so that the testing the injectivity of a given module is an important topic. Bear's... more
    • by 
It is forecasted that the future 4G environments will see increase of IP-based services from the expansion of wire-less internet and integration of wired and wireless networks, and the digital ID management technology in the wireless... more
    • by