scispace - formally typeset
Search or ask a question

Showing papers by "Takeshi Shimoyama published in 2004"


Journal Article
TL;DR: In this article, a theoretical analysis of the χ2 attack proposed by Knudsen and Meier on the RC6 block cipher is given, and the transition matrix computing (TMCC) method is used to evaluate the security against χ 2 attack.
Abstract: In this paper, we give a theoretical analysis of χ2 attack proposed by Knudsen and Meier on the RC6 block cipher. To this end, we propose the method of security evaluation against χ2 attack precisely including key dependency by introducing a method "Transition Matrix Computing." Previously, no theoretical security evaluation against χ2 attack was known, it has been done by computer experiments. We should note that this is the first results that a theoretical evaluation against χ2 attack is shown.

8 citations


Posted Content
TL;DR: This manuscript implemented GNFS and factored 100to 150-digits number on the same environment using lattice sieve and did not use line sieve, hoping that these results will help running time estimation of factoring a large integer.

5 citations