Changes between Version 22 and Version 23 of Bibliography


Ignore:
Timestamp:
2008-08-01T15:16:56Z (16 years ago)
Author:
zooko
Comment:

add link to defectoscopy

Legend:

Unmodified
Added
Removed
Modified
  • Bibliography

    v22 v23  
    1010[http://cr.yp.to/snuffle.html#security Salsa20 Security Arguments] why Salsa20 is probably safe against this and that threat
    1111
    12 [http://www.enrupt.com/EnRUPT_007.pdf EnRUPT] a very simple, fast, and flexible primitive which could be used as both stream cipher and secure hash function (the two such primitives that we currently need) and which relies for its security on a large number of rounds.  The question of how many rounds to use is decided by semi-automated cryptanalysis.
     12[http://enrupt.com EnRUPT] a very simple, fast, and flexible primitive which could be used as stream cipher, secure hash function, or MAC (the first two are primitives that we currently need, and the third one -- MAC -- is a primitive that we may want in the future) and which relies for its security on a large number of rounds.  The question of how many rounds to use is decided by semi-automated cryptanalysis.
     13
     14[http://defectoscopy.com/results.html defectoscopy.com] a table of semi-automated cryptanalysis results from the inventors of EnRUPT.  This technique is not well accepted by the mainstream of cryptographers.  I (Zooko) can't judge how valid it is.  Note that Tiger is one of only two hash functions that are predicted to be secure by this analysis -- the other is Whirlpool.  MD-4/5, SHA-0/1/2, and GOST are predicted to be insecure.
    1315
    1416=== Elliptic Curve Cryptography ===