Attacking BEAR and LION Schemes in a Realistic Scenario

被引:0
|
作者
Piva, Matteo [1 ]
Pizzato, Marco [1 ]
Sala, Massimiliano [1 ]
机构
[1] Univ Trent, Trento, Italy
来源
关键词
Block-ciphers; Stream-ciphers; Hash functions; BEAR; LION; Key-recovery;
D O I
10.1007/978-3-319-23021-4_17
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
BEAR and LION are block ciphers introduced by Biham and Anderson in 1996. Their special feature is that they use very efficiently a hash function and a stream cipher, so that the hardware implementation of BEAR and LION becomes straightforward, assuming that the two other primitives are already present. In this paper we discuss their security starting from the strength of their building blocks.
引用
收藏
页码:189 / 195
页数:7
相关论文
共 50 条
  • [1] On the provable security of BEAR and LION schemes
    Maines, Lara
    Piva, Matteo
    Rimoldi, Anna
    Sala, Massimiliano
    [J]. APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING, 2011, 22 (5-6) : 413 - 423
  • [2] On the provable security of BEAR and LION schemes
    Lara Maines
    Matteo Piva
    Anna Rimoldi
    Massimiliano Sala
    [J]. Applicable Algebra in Engineering, Communication and Computing, 2011, 22 : 413 - 423
  • [3] Attacking visible watermarking schemes
    Huang, CH
    Wu, JL
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2004, 6 (01) : 16 - 30
  • [4] THE HAPPY LION AND THE BEAR - FATIO,L
    不详
    [J]. ELEMENTARY ENGLISH, 1965, 42 (04): : 465 - 465
  • [5] DAVINCI,LEONARDO ANATOMIC STUDIES ON LION AND BEAR
    HOFFMANN, G
    [J]. DISEASES IN ZOO ANIMALS, 1989, : 467 - 468
  • [6] Polytrauma Caused by a Bear Attacking a Human with a Benign Outcome
    Mellin, Ruslan
    Velichko, Ellina
    Maltseva, Larisa
    Dydykin, Sergey
    Vasil'ev, Yuriy
    [J]. HEALTHCARE, 2024, 12 (05)
  • [7] Attacking and repairing batch verification schemes
    Boyd, C
    Pavlovski, C
    [J]. ADVANCES IN CRYPTOLOGY ASIACRYPT 2000, PROCEEDINGS, 2000, 1976 : 58 - 71
  • [8] THE BEAR AND THE LION - SOVIET IMPERIALISM AND IRAN - SICKER,M
    RUBINSTEIN, AZ
    [J]. MIDDLE EAST JOURNAL, 1989, 43 (03): : 514 - 514
  • [9] THE BEAR AND THE LION - SOVIET IMPERIALISM AND IRAN - SICKER,M
    KANET, RE
    KATNER, GT
    FINLAY, JM
    [J]. OSTEUROPA, 1990, 40 (06): : 558 - 566
  • [10] Attacking Cryptographic Schemes Based on "Perturbation Polynomials"
    Albrecht, Martin
    Gentry, Craig
    Halevi, Shai
    Katz, Jonathan
    [J]. CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 1 - 10