- Full text PDF available (7)
- This year (0)
- Last 5 years (0)
- Last 10 years (1)
Journals and Conferences
We present the new block cipher SHARK. This cipher combines highly non-linear substitution boxes and maximum distance separable error correcting codes (MDS-codes) to guarantee a good di usion. The cipher is resistant against di erential and linear cryptanalysis after a small number of rounds. The structure of SHARK is such that a fast software… (More)
This paper describes a fast software implementation of the elliptic curve version of DSA, as speciied in draft standard documents ANSI X9.62 and IEEE P1363. We did the implementations for the elds GF(2 n), using a standard basis, and GF(p). We discuss various design decisions that have to be made for the operations in the underlying eld and the operations… (More)
We propose a new attack on Feistel ciphers with a non-surjective round function. CAST and LOKI91 are examples of such ciphers. We extend the attack towards ciphers that use a non–uniformly distributed round function and apply the attack to CAST.
In this paper we give an introduction to elliptic curve public key cryptosystems. We explain how the discrete logarithm in an elliptic curve group can be used to construct cryptosystems. We also focus on practical aspects such as implementation, standardization and intellectual property.
We give a brief introduction to elliptic curve public-key cryptosystems. We explain how the discrete logarithm in an elliptic curve group can be used to construct cryptosystems. We also focus on practical aspects such as implementation, standardization and intellectual property.
We present a software implementation of arithmetic operations in a nite eld GF(2 n), based on an alternative representation of the eld elements. An important application is in elliptic curve crypto-systems. Whereas previously reported implementations of elliptic curve cryptosystems use a standard basis or an optimal normal basis to perform eld operations,… (More)
The demands of secured electronic transactions are increasing rapidly. Prime Field Elliptic curve cryptosystems (PFECC) are becoming most popular because of the reduced number of key bits required in comparison to other cryptosystems. PFECC is emerging as an attractive alternative to traditional public-key cryptosystems. PFECC offers equivalent security… (More)