NES/DOC/KUL/WP3/005/a |
Paulo Barreto, Vincent Rijmen, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle, Hae
Y. Kim |
Improved
SQUARE attacks against reduced-round HIEROCRYPT |
|
NES/DOC/KUL/WP3/006/1 |
Bart Van Rompay, Vincent Rijmen, Jorge Nakahara Jr |
A first report on CS-Cipher, Hierocrypt,
Grand Cru, SAFER++, and SHACAL |
12/03/2001 |
NES/DOC/KUL/WP3/008/1 |
Bart Van Rompay |
A first report on UMAC |
12/03/2001 |
NES/DOC/KUL/WP3/012/1 |
Jorge Nakahara |
The
Statistical Evaluation of the NESSIE Submission NUSH |
22/10/2001 |
NES/DOC/KUL/WP3/013/1 |
Jorge Nakahara |
The
Statistical Evaluation of the NESSIE Submission RC6 |
22/10/2001 |
NES/DOC/KUL/WP3/014/1 |
Jorge Nakahara |
The
Statistical Evaluation of the NESSIE Submission SAFER++ |
22/10/2001 |
NES/DOC/KUL/WP3/016/1 |
Jorge Nakahara |
The
Statistical Evaluation of the NESSIE Submission SHACAL |
22/10/2001 |
NES/DOC/ENS/WP3/004/1 |
Eiichiro Fujisaki, Tatsuaki Okamoto, David Pointcheval, Jacques Stern |
RSA-OAEP
is Secure under the RSA Assumption |
29/05/2001 |
NES/DOC/ENS/WP3/005/2 |
Gwenaëlle Martinet |
The Security Assumptions |
07/03/2001 |
NES/DOC/ENS/WP3/006/2 |
Gwenaëlle Martinet |
QUARTZ, FLASH, and SFLASH |
07/03/2001 |
NES/DOC/ENS/WP3/007/2 |
Gwenaëlle Martinet |
RSA-OAEP and RSA-PSS |
02/03/2001 |
NES/DOC/ENS/WP3/008/2 |
Mathieu Ciet, Gwenaëlle Martinet, Francesco Sica |
ACE: Advanced Cryptographic Engine |
02/03/2001 |
NES/DOC/ENS/WP3/009/a |
Gwenaëlle Martinet |
Selecting a C*-- scheme
| 01/06/2001 |
NES/DOC/ENS/WP3/010/a |
Gwenaëlle Martinet |
Comparison of two signature schemes based on the RSA assumption
| 01/06/2001 |
NES/DOC/RHU/WP2/001/2 |
Sean Murphy |
The
Power of NIST's Statistical Testing of AES Candidates, |
14/03/2000 |
NES/DOC/RHU/WP3/004/b |
Rachel Shipsey |
GPS |
31/01/2001 |
NES/DOC/RHU/WP3/005/b |
Rachel Shipsey |
Esign |
1/02/2001 |
NES/DOC/RHU/WP3/006/b |
Rachel Shipsey |
ECDSA |
2/02/2001 |
NES/DOC/RHU/WP3/007/c |
Rachel Shipsey |
ECIES |
1/03/2001 |
NES/DOC/RHU/WP3/008/b |
Rachel Shipsey |
PSEC-1-2-3 |
2/02/2001 |
NES/DOC/RHU/WP3/009/2 |
Juliette White |
LEVIATHAN stream cipher |
2/02/2001 |
NES/DOC/RHU/WP3/010/2 |
Juliette White |
LILI-128 stream cipher |
2/02/2001 |
NES/DOC/RHU/WP3/011/2 |
Juliette White |
EPOC asymmetric encryption scheme |
2/02/2001 |
NES/DOC/RHU/WP3/012/a |
Rachel Shipsey |
Selecting a Version of PSEC |
27/02/2001 |
NES/DOC/RHU/WP3/014/a |
Rachel Shipsey |
Summary
of Victor Shoup's ISO Document on Public Key Encryption |
22/03/2001 |
NES/DOC/RHU/WP3/015/a |
Rachel Shipsey |
How
long ...? |
19/04/2001 |
NES/DOC/SAG/WP3/003/1 |
Pascale Serf |
The
degrees of completeness, of avalanche effect, and of strict avalanche criterion for MARS,
RC6, Rijndael, Serpent, and Twofish with reduced number of rounds |
3/04/2000 |
NES/DOC/SAG/WP3/015/2 |
Markus Dichtl |
Statistical Results for the NESSIE Submission SOBER-t16 |
14/03/2001 |
NES/DOC/SAG/WP3/016/2 |
Markus Dichtl |
Statistical Results for the NESSIE Submission SOBER-t32 |
07/03/2001 |
NES/DOC/SAG/WP3/017/2 |
Markus Dichtl |
Statistical Results for the NESSIE Submission SNOW with 128-bit key size |
14/03/2001 |
NES/DOC/SAG/WP3/018/3 |
Bernd Meyer |
About the NESSIE submission ``BMGL: Synchronous Key-stream Generator with Provable Security'' |
14/03/2001 |
NES/DOC/SAG/WP3/019/2 |
Markus Dichtl, Pascale Serf |
About the NESSIE submission ``Using the general next bit predictor like an evaluation criteria'' |
19/03/2001 |
NES/DOC/SAG/WP3/025/2 |
Marcus Schafheutle |
A First Report on the Stream Ciphers SOBER-t16 and SOBER-t32 |
26/07/2001 |
NES/DOC/SAG/WP3/026/2 |
Marcus Schafheutle |
A First Report on the Stream Cipher SNOW |
26/07/2001 |
NES/DOC/SAG/WP3/027/1 |
Marcus Schafheutle |
Statistical Attacks on the Stream Cipher LEVIATHAN |
29/03/2001 |
NES/DOC/SAG/WP3/034/1 |
Marcus Schafheutle |
The Statistical Evaluation of the NESSIE Submission SC2000 |
20/06/2001 |
NES/DOC/SAG/WP3/036/1 |
Marcus Schafheutle |
The Statistical Evaluation of the NESSIE Submission Two-Track-MAC |
11/07/2001 |
NES/DOC/SAG/WP3/037/1 |
Marcus Schafheutle |
The Statistical Evaluation of the NESSIE Submission Whirlpool |
11/07/2001 |
NES/DOC/SAG/WP3/038/1 |
Stefan Pyka |
The Statistical Evaluation of the NESSIE Submission UMAC |
26/07/2001 |
NES/DOC/SAG/WP3/039/1 |
Stefan Pyka |
The Statistical Evaluation of the NESSIE Submission BMGL |
03/08/2001 |
NES/DOC/SAG/WP3/040/1 |
Marcus Schaftheutle |
The Statistical Evaluation of the SOBER-t Key Expansion |
30/07/2001 |
NES/DOC/SAG/WP3/041/1 |
Stefan Pyka |
The Statistical Evaluation of the SNOW Key Expansion |
03/08/2001 |
NES/DOC/TEC/WP3/001/1 |
Eli Biham, Vladimir Furman |
Impossible
Differential on 8-Round MARS' Core |
11/09/2000 |
NES/DOC/TEC/WP3/002/1 |
Eli Biham |
Cryptanalysis
of Patarin's 2-Round Public Key System with S-Boxes (2R) |
|
NES/DOC/TEC/WP3/004/1 |
Eli Biham, Vladimir Furman |
Improved
Impossible Differentials on Twofish |
11/09/2000 |
NES/DOC/TEC/WP3/005/a |
Eli Biham, Orr Dunkelman |
Cryptanalysis
of the A5/1 GSM Stream Cipher |
|
NES/DOC/TEC/WP3/006/a |
Eli Biham, Orr Dunkelman, Nathan Keller |
The
Rectangle Attack - Rectangling the Serpent |
11/01/2001 |
NES/DOC/TEC/WP3/008/1 |
Eli Biham, Orr Dunkelman, Nathan Keller |
Linear
Cryptanalysis of Reduced Round Serpent |
20/06/2001 |
NES/DOC/TEC/WP3/009/1 |
Eli Biham, Vladimir Furman |
Differential
Cryptanalysis of Nimbus |
29/11/2000 |
NES/DOC/TEC/WP3/011/b |
Eli Biham, Orr Dunkelman, Vladimir Furman, Tal Mor |
Preliminary report on the NESSIE submissions
Anubis, Camellia, IDEA, Khazad, Misty1, Nimbus, Q |
|
NES/DOC/TEC/WP3/012/1 |
Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen |
Differential
Cryptanalysis of Q |
11/02/2001 |
NES/DOC/TEC/WP3/014/a |
Orr Dunkelman, Nathan Keller |
Boomerang and Rectangle Attacks on SC2000
|
03/07/2001 |
NES/DOC/TEC/WP3/019/1 |
Yan Braziler |
The
statistical evaluation of the NESSIE submission Camellia |
28/11/2001 |
NES/DOC/TEC/WP3/020/1 |
Yan Braziler |
The
statistical evaluation of the NESSIE submission Grand Cru |
28/11/2001 |
NES/DOC/TEC/WP3/021/1 |
Yan Braziler |
The
statistical evaluation of the NESSIE submission Hierocrypt-3 |
28/11/2001 |
NES/DOC/TEC/WP3/022/1 |
Yan Braziler |
The
statistical evaluation of the NESSIE submission Hierocrypt-L1 |
28/11/2001 |
NES/DOC/TEC/WP3/023/1 |
Yan Braziler |
The
statistical evaluation of the NESSIE submission Misty |
28/11/2001 |
NES/DOC/UIB/WP3/001/a |
Lars Knudsen, Håvard Raddum |
Linear
approximations to the MARS S-box |
6/04/2000 |
NES/DOC/UIB/WP3/002/1 |
Lars Knudsen |
The
Twofish S-boxes |
17/03/2000 |
NES/DOC/UIB/WP3/003/a |
Lars R. Knudsen |
The
Number of Rounds in Block Ciphers |
12/05/2000 |
NES/DOC/UIB/WP3/004/a |
Lars R. Knudsen |
Trawling
Twofish (revisited) |
15/05/2000 |
NES/DOC/UIB/WP3/005/a |
Lars R. Knudsen, Håvard Raddum |
Recommendation
to NIST for the AES |
15/05/2000 |
NES/DOC/UIB/WP3/006/a |
Lars R. Knudsen |
Block
chaining modes of operation |
6/10/2000 |
NES/DOC/UIB/WP3/007/b |
Lars R. Knudsen, Håvard Raddum |
A first report on Whirlpool, NUSH, SC2000,
Noekeon, Two-Track-Mac and RC6 |
07/03/2001 |
NES/DOC/UIB/WP3/008/1 |
Håvard Raddum, Lars R. Knudsen |
A
differential attack on reduced-round SC2000 |
30/04/2001 |
NES/DOC/UIB/WP3/009/1 |
Lars R. Knudsen, Havard Raddum |
On
Noekeon |
24/04/2001 |
NES/DOC/UIB/WP3/010/1 |
Håvard Raddum |
The
Statistical Evaluation of the NESSIE Submission CS-cipher |
20/09/2001 |
NES/DOC/UIB/WP3/011/1 |
Håvard Raddum |
The
Statistical Evaluation of the NESSIE Submission Anubis |
20/09/2001 |
NES/DOC/UIB/WP3/012/1 |
Håvard Raddum |
The
Statistical Evaluation of the NESSIE Submission IDEA |
20/09/2001 |
NES/DOC/UIB/WP3/013/1 |
Håvard Raddum |
The
Statistical Evaluation of the NESSIE Submission Khazad |
20/09/2001 |
NES/DOC/UIB/WP3/014/1 |
Håvard Raddum |
The
Statistical Evaluation of the NESSIE Submission Noekeon |
20/09/2001 |
NES/DOC/EXT/WP3/001/2 |
Steve Babbage |
Cryptanalysis of LILI-128 |
22/01/2001 |
NES/DOC/KUL/WP5/010/a |
Christophe De Canniere |
Guess
and Determine Attack on SOBER |
12/11/2001 |
NES/DOC/KUL/WP5/011/a |
Christophe De Canniere |
Guess
and Determine Attack on SNOW |
12/11/2001 |
NES/DOC/KUL/WP5/017/1 |
Jorge Nakahara Jr, Paulo S.L.M. Barreto, Bart Preneel, Joos Vandewalle,
Hae Y. Kim |
SQUARE
Attacks on Reduced-Round PES and IDEA Block Ciphers |
19/11/2001 |
NES/DOC/KUL/WP5/19/1 |
Alex Biryukov, Jorge Nakahara Jr, Bart Preneel, Joos Vandewalle |
New Weak Key Classes of IDEA |
29/06/2002 |
NES/DOC/KUL/WP5/022/1 |
Elisabeth Oswald and Bart Preneel |
A Theoretical Evaluation of some NESSIE Candidates regarding their Susceptibility
towards Power Analysis Attacks |
04/10/2002 |
NES/DOC/KUL/WP6/023/1 |
Siddika Berna Ors, Lejla Batina, Bart Preneel |
Hardware Implementation of Elliptic Curve Processor
over GF(p) |
10/10/2002 |
NES/DOC/KUL/WP5/027/1 |
Elisabeth Oswald and Bart Preneel |
A Survey on Passive Side-Channel Attacks and their Countermeasures for
the NESSIE Public-Key Cryptosystems |
08/01/2003 |
NES/DOC/KUL/WP5/30/1 |
Jorge Nakahara Jr, Bart Preneel, Joos Vandewalle |
Impossible Differential Attacks on reduced-Round SAFER ciphers |
22/02/2003 |
NES/DOC/ENS/WP1/018/1 |
Emmanuelle Dottax |
Tweak
Reviews: ESIGN, RSA-PSS, QUARTZ and SFLASH |
08/01/2002 |
NES/DOC/ENS/WP5/012/3 |
Louis Granboulan |
RSA
hybrid encryption schemes |
19/12/2001 |
NES/DOC/ENS/WP5/019/3 |
Louis Granboulan |
How to repair ESIGN |
13/09/2002 |
NES/DOC/ENS/WP5/021/2 |
Louis Granboulan |
Short signatures in the random oracle model |
20/08/2002 |
NES/DOC/ENS/WP5/022/1 |
Louis Granboulan |
PECDSA. How to build a DL-based signature scheme with the best proven security |
20/09/2002 |
NES/DOC/ENS/WP5/026/1 |
Antoine Joux and Gwenaëlle Martinet |
Weaknesses in Quartz Signature Scheme |
24/01/2003 |
NES/DOC/ENS/WP5/028/1 |
Emmanuelle Dottax |
Three asymmetric schemes based upon the factoring assumption:
EPOC-2, HIME(R) and Rabin-SAEP |
10/02/2003 |
NES/DOC/ENS/WP6/030/2 |
Emmanuelle Dottax |
Results on the implementations of KHAZAD, MISTY1 and SAFER++ on a 8051 cpu |
17/09/2002 |
NES/DOC/ENS/WP5/031/1 |
Emmanuelle Dottax |
Fault Attacks on NESSIE Signature and Identification Schemes |
08/10/2002 |
NES/DOC/ENS/WP5/035/1 |
Emmanuelle Dottax |
Fault and chosen modulus attacks on some NESSIE asymmetric primitives |
10/02/2003 |
NES/DOC/RHU/WP5/016/1 |
Rachel Shipsey |
Tweak review: PSEC-KEM |
19/11/2001 |
NES/DOC/RHU/WP5/017/3 |
Alexander W. Dent |
An evaluation of EPOC-2 |
05/09/2002 |
NES/DOC/RHU/WP5/018/1 |
Alexander W. Dent |
A review of the tweaks and code of EPOC-2 |
17/12/2001 |
NES/DOC/RHU/WP5/019/2 |
Alex Dent |
A review of the code supplied with the asymmetric ciphers |
08/05/2002 |
NES/DOC/RHU/WP5/020/a |
Alexander W. Dent and Emmanuelle Dottax |
An overview of side-channel attacks on the asymmetric
NESSIE encryption primitives |
14/05/2002 |
NES/DOC/RHU/WP5/021/3 |
Alexander W. Dent |
Adapting the weaknesses of the Random Oracle model to the Generic Group model |
19/09/2002 |
NES/DOC/RHU/WP5/022/2 |
Sean Murphy and Matthew Robshaw |
Essential Algebraic Structure within the AES |
26/09/2002 |
NES/DOC/RHU/WP5/023/3 |
Alexander W. Dent |
ACE-KEM and the general KEM-DEM structure |
19/09/2002 |
NES/DOC/RHU/WP5/026/1 |
Sean Murphy and Matthew Robshaw |
Comments on the Security of the AES and the XSL Technique |
26/09/2002 |
NES/DOC/RHU/WP5/028/2 |
Alexander W. Dent |
ECIES-KEM vs. PSEC-KEM |
13/11/2002 |
NES/DOC/RHU/WP5/029/1 |
Alexander W. Dent |
A Designer's Guide to KEMs |
13/11/2002 |
NES/DOC/SAG/WP1/048/1 |
Marcus Schafheutle |
Tweak Review: BMGL |
08/05/2002 |
NES/DOC/SAG/WP5/044/1 |
Stefan Pyka |
The Statistical Evaluation of the SNOW Initialization Vector Expansion
|
30/10/2001 |
NES/DOC/SAG/WP5/046/1 |
Markus Dichtl and Marcus Schafheutle |
Linearity Properties of the SOBER-t32 Key Loading
|
19/11/2001 |
NES/DOC/TEC/WP2/007/2 |
Arueh Bibliowicz, Pnina Cohen, Eli Biham |
A System for Assisting Analysis of Some Block Ciphers |
13/03/2003 |
NES/DOC/TEC/WP3/015/a |
Orr Dunkelman |
Safety Margins for NESSIE submissions - Safer++ and Hierocrypt (L1/3) |
31/12/2002 |
NES/DOC/TEC/WP5/017/1 |
Eli Biham, Orr Dunkelamn, Nathan Keller |
Enhancing Differential-Linear Cryptanalysis |
31/12/2002 |
NES/DOC/TEC/WP5/18/1 |
Eli Biham Orr Dunkelman Nathan Keller |
New Results on Boomerang and Rectangle Attacks |
13/03/2003 |
NES/DOC/TEC/WP6/024/2 |
Markus Dichtl, Eli Biham |
Extended NESSIE Standard Interface for Symmetric and Asymmetric Algorithms |
28/06/2002 |
NES/DOC/TEC/WP6/026/1 |
Eli Biham |
Optimization of Idea |
27/01/2002 |
NES/DOC/TEC/WP5/029/a |
Orr Dunkelamn |
Comparing MISTY1 and KASUMI |
31/12/2002 |
NES/DOC/UCL/WP5/002/1 |
Gilles Piret, Jean-Jacques Quisquater |
Integral Cryptanalysis on reduced-round Safer++ |
14/02/2003 |
NES/DOC/UCL/WP6/002/2 |
Francesco Sica, Mathieu Ciet and Jean-Jacques Quisquater |
Analysis of the Gallant-Lambert-Vanstone Method based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves |
20/09/2002 |
NES/DOC/UIB/WP5/015/1 |
Lars R. Knudsen |
Integral
cryptanalysis |
11/12/2001 |
NES/DOC/UIB/WP5/016/2 |
Lars Knudsen |
Non-random properties of reduced-round Whirlpool |
15/08/2002 |
NES/DOC/UIB/WP5/017/1 |
Lars Knudsen |
Quadratic relations in Khazad and Whirlpool |
27/06/2002 |
NES/DOC/UIB/WP5/020/A |
Matthew G. Parker |
Generalised S-Box Nonlinearity |
18/02/2003 |
NES/DOC/UIB/WP5/022/1 |
Lars Knudsen |
Correlations in RC6 on 256-bit blocks |
30/09/2002 |
NES/DOC/UIB/WP5/024/2 |
Lars R. Knudsen |
Analysis of RMAC |
14/11/2002 |
NES/DOC/EXT/WP5/002/1 |
Taizo Shirai, Kyoji Shibutani |
On the diffusion matrix employed in the Whirlpool hashing function |
11/03/2003 |