Authenticating Multicast Internet Electronic Mail Messages Using a Bidirectional MAC is Insecure
IEEE Transactions on Computers
BEAST: a fast block cipher for arbitrary blocksizes
Proceedings of the IFIP TC6/TC11 international conference on Communications and multimedia security II
Proceedings of the Third International Workshop on Fast Software Encryption
Proceedings of the Third International Workshop on Fast Software Encryption
Proceedings of the 4th International Workshop on Fast Software Encryption
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
How to Strengthen DES Using Existing Hardware
ASIACRYPT '94 Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
A Software-Optimised Encryption Algorithm
Fast Software Encryption, Cambridge Security Workshop
New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis
Proceedings of the Third International Workshop on Fast Software Encryption
Two Practical and Provably Secure Block Ciphers: BEARS and LION
Proceedings of the Third International Workshop on Fast Software Encryption
Optimizing a Fast Stream Cipher for VLIW, SIMD, and Superscalar Processors
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
FSE '97 Proceedings of the 4th International Workshop on Fast Software Encryption
Fast Hashing and Stream Encryption with PANAMA
FSE '98 Proceedings of the 5th International Workshop on Fast Software Encryption
On the Construction of Variable-Input-Length Ciphers
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of the Mercy Block Cipher
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
The Analysis of Windows Vista Disk Encryption Algorithm
Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security
Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
Tweakable Pseudorandom Permutation from Generalized Feistel Structure
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Improving the generalized Feistel
FSE'10 Proceedings of the 17th international conference on Fast software encryption
HCTR: a variable-input-length enciphering mode
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Encrypted watermarks and linux laptop security
WISA'04 Proceedings of the 5th international conference on Information Security Applications
On the security of tweakable modes of operation: TBC and TAE
ISC'05 Proceedings of the 8th international conference on Information Security
Hi-index | 0.00 |
We discuss the special requirements imposed on the underlying cipher of systems which encrypt each sector of a disk partition independently, and demonstrate a certificational weakness in some existing block ciphers including Bellare and Rogaway's 1999 proposal, proposing a new quantitative measure of avalanche. To address these needs, we present Mercy, a new block cipher accepting large (4096-bit) blocks, which uses a key-dependent state machine to build a bijective F function for a Feistel cipher. Mercy achieves 9 cycles/byte on a Pentium compatible processor.