In this thesis we discuss security aspects of three symmetric-key primitives – Block Cipher, Hash function and MAC (Message Authentication Codes). More specifically, we present the results of our analysis on some ARX based hash functions and block ciphers. We analyse the security of recently proposed light-weight block ciphers – SIMON and SPECK. We give a generic graph based method to compute differential probability of bitwise AND with independent and rotationally dependent inputs. Using this algorithm we apply the automatic differential trail searching method for SIMON. We show the results of this search technique, extended for searching differential and applied to both SIMON and SPECK. Using this differential analysis we could perform ke...
Symmetric key cryptographic primitives are the essential building blocks in modern information secur...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
Differential cryptanalysis is one of the most basic and powerful attacks against symmetric key crypt...
We cryptanalyze several symmetric encryption and hashing algorithms. A central factor in the securit...
Abstract. In this paper we continue the previous line of research on the analysis of the differentia...
"December 2013""A thesis submitted for the degreee of Doctor of Philosophy"Includes bibliographical ...
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It dis...
It is hard to overestimate the ubiquity and importance of securecommunications and information proce...
Symmetric-key cryptology is the oldest form of cryptology in which identical keys are used by the se...
Cryptography is the art and science of secret communication. In the past it has been exclusively the...
When the public-key cryptography was introduced in the 1970s, symmetric-key cryptography was believe...
The development of modern cryptography is associated with the emergence of computing machines. Since...
"A thesis submitted to Macquarie University for the degree of Doctor of Philosophy, Department of Co...
While differential behavior of modern ciphers in a single secret key scenario is relatively well und...
Cette thèse contribue à l’effort de cryptanalyse de primitives symétriques comme les chiffrements pa...
Symmetric key cryptographic primitives are the essential building blocks in modern information secur...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
Differential cryptanalysis is one of the most basic and powerful attacks against symmetric key crypt...
We cryptanalyze several symmetric encryption and hashing algorithms. A central factor in the securit...
Abstract. In this paper we continue the previous line of research on the analysis of the differentia...
"December 2013""A thesis submitted for the degreee of Doctor of Philosophy"Includes bibliographical ...
This paper reviews constructions of hash functions and MAC algorithms based on block ciphers. It dis...
It is hard to overestimate the ubiquity and importance of securecommunications and information proce...
Symmetric-key cryptology is the oldest form of cryptology in which identical keys are used by the se...
Cryptography is the art and science of secret communication. In the past it has been exclusively the...
When the public-key cryptography was introduced in the 1970s, symmetric-key cryptography was believe...
The development of modern cryptography is associated with the emergence of computing machines. Since...
"A thesis submitted to Macquarie University for the degree of Doctor of Philosophy, Department of Co...
While differential behavior of modern ciphers in a single secret key scenario is relatively well und...
Cette thèse contribue à l’effort de cryptanalyse de primitives symétriques comme les chiffrements pa...
Symmetric key cryptographic primitives are the essential building blocks in modern information secur...
We consider the security of message authentication code (MAC) algorithms, and the construction of MA...
Differential cryptanalysis is one of the most basic and powerful attacks against symmetric key crypt...