#### Filter Results:

- Full text PDF available (25)

#### Publication Year

2005

2017

- This year (1)
- Last 5 years (8)
- Last 10 years (16)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- Simon Fischer, Shahram Khazaei, Willi Meier
- AFRICACRYPT
- 2008

A recent framework for chosen IV statistical distinguishing analysis of stream ciphers is exploited and formalized to provide new methods for key recovery attacks. As an application, a key recovery attack on simplified versions of two eSTREAM Phase 3 candidates is given: For Grain-128 with IV initialization reduced to up to 180 of its 256 iterations, and… (More)

- Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger
- IACR Cryptology ePrint Archive
- 2007

The stream cipher Salsa20 was introduced by Bernstein in 2005 as a candidate in the eSTREAM project, accompanied by the reduced versions Salsa20/8 and Salsa20/12. ChaCha is a variant of Salsa20 aiming at bringing better diffusion for similar performance. Variants of Salsa20 with up to 7 rounds (instead of 20) have been broken by differential cryptanalysis,… (More)

- Shahram Khazaei, Douglas Wikström
- CT-RSA
- 2012

We study mix-nets with randomized partial checking (RPC) as proposed by Jakobsson, Juels, and Rivest (2002). RPC is a technique to verify the correctness of an execution both for Chaumian and homomorphic mix-nets. The idea is to relax the correctness and privacy requirements to achieve a more efficient mix-net. We identify serious issues in the original… (More)

- Shahram Khazaei
- 2005

Pomaranch is a synchronous stream cipher submitted to eSTREAM, the ECRYPT Stream Cipher Project. It uses 128-bit keys and IVs with different lengths. The cipher is constructed as a cascade clock control sequence generator, which is based on the notion of jump registers. Each jump register can be considered as a non-autonomous finite state machine which the… (More)

- Eric Brier, Shahram Khazaei, Willi Meier, Thomas Peyrin
- ASIACRYPT
- 2009

In this paper, an improved differential cryptanalysis framework for finding collisions in hash functions is provided. Its principle is based on linearization of compression functions in order to find low weight differential characteristics as initiated by Chabaud and Joux. This is formalized and refined however in several ways: for the problem of finding a… (More)

- Shahram Khazaei
- 2005

Abstract ABC is a synchronous stream proposed as a candidate to ECRYPT Project. ABC gets a 128-bit key and a 128-bit IV and produces 1195 bits as the internal state of the cipher. Using some statistical simulations we show that one of the ABC components, a key-IV dependent function over GF(2) called C which is chosen randomly from a family of functions, is… (More)

ABC is a synchronous stream proposed as a candidate to ECRYPT Project which has been withdrawn because of the attacks proposed in [4, 7]. The attacks benefit the non-bijectivity property of one of the ABC components called C which is a parametric function from GF(2) into GF(2). The designers of ABC updated it to a new (longer) version called ABC v.2. The… (More)

- Shahram Khazaei, Tal Moran, Douglas Wikström
- ASIACRYPT
- 2012

We construct a provably secure mix-net from any CCA2 secure cryptosystem. The mix-net is secure against active adversaries that statically corrupt less than λ out of k mix-servers, where λ is a threshold parameter, and it is robust provided that at most min(λ− 1, k − λ) mix-servers are corrupted. The main component of our construction is a mix-net that… (More)

- Shahram Khazaei, Simon Fischer, Willi Meier
- Selected Areas in Cryptography
- 2007

In this paper, we present some reduced complexity attacks on the Alternating Step Generator (ASG). The attacks are based on a quite general framework and mostly benefit from the low sampling resistance of the ASG, and of an abnormal behavior related to the distribution of the initial states of the stop/go LFSR’s which produce a given segment of the output… (More)

Cryptographic primitives are the basic components of any cryptographic tool. Block ciphers, stream ciphers and hash functions are the fundamental primitives of symmetric cryptography. In symmetric cryptography, the communicating parties perform essentially the same operation and use the same key, if any. This thesis concerns cryptanalysis of stream ciphers… (More)