Quoting Jonathan Katz :
On Mon, 14 Jun 2010, Alfonso De Gregorio wrote:
The last Thursday, Vincent Rijmen announced a new clever attack on
AES (and KASUMI) in a report posted to the Cryptology ePrint
Archive: Practical-Titled Attack on AES-128 Using Chosen-Text
Relations, http
The last Thursday, Vincent Rijmen announced a new clever attack on AES
(and KASUMI) in a report posted to the Cryptology ePrint Archive:
Practical-Titled Attack on AES-128 Using Chosen-Text Relations,
http://eprint.iacr.org/2010/337
I believe the related-subkey model is an interesting model
On Tue, Apr 20, 2010 at 12:29 AM, Massimiliano Pala
wrote:
Hi all,
I was wondering if any of you have some pointers on the security of
watermarking. In particular I am interested in public-key or asymmetric
watermarking algorithms.
Ciao Massimiliano,
You might be interesting in checking out
Hi Steven, hi Benne,
Yes, this is a sweet and sour truth. We are not getting closer to
preimage attacks. We are getting more far away from considering preimage
and second-preimage resistance sufficient hash-function requirements for
the real-world security of some protocols.
Cheers,
-- Alfonso
Hi All,
On 3rd march 2005, in a follow up to the announcement by Benne de Weger,
Xiaoyun Wang and Arjen Lenstra [LWdW], I wrote a note explaining how it
is possible to apply their method also for the construction of pairs of
colliding RFC 3161 [3161] time-stamp tokens - my original note is
availa
I hope this might be of interest.
Alfonso
--- Begin Message ---
Hi All.
I would like to thank Arjen Lenstra, Xiaoyun Wang, and Benne de Weger
for announcing a method for the construction of pairs of colliding
X.509 certificates, and David McGrew for forwarding to the list.
I would like also to poin