The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Cryptanalysis with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1982 (17) 1983-1985 (15) 1986-1988 (18) 1989-1990 (17) 1991 (19) 1992-1993 (37) 1994 (34) 1995 (18) 1996 (26) 1997 (34) 1998 (48) 1999 (43) 2000 (56) 2001 (80) 2002 (91) 2003 (108) 2004 (113) 2005 (172) 2006 (171) 2007 (181) 2008 (222) 2009 (206) 2010 (142) 2011 (177) 2012 (171) 2013 (152) 2014 (175) 2015 (209) 2016 (205) 2017 (168) 2018 (186) 2019 (188) 2020 (158) 2021 (174) 2022 (160) 2023 (183) 2024 (43)
Publication types (Num. hits)
article(2176) book(10) incollection(26) inproceedings(1893) phdthesis(112)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2108 occurrences of 562 keywords

Results
Found 4217 publication records. Showing 4217 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
96David A. Wagner 0001 Towards a Unifying View of Block Cipher Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
92Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis
87Xuejia Lai, James L. Massey, Sean Murphy Markov Ciphers and Differential Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
84Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Square-multiply exponentiation, Cryptography, Side channel attack, Exponentiation, Timing attack, Power analysis attack, Physical cryptanalysis, Hardware fault cryptanalysis
75Thomas Baignères, Pascal Junod, Serge Vaudenay How Far Can We Go Beyond Linear Cryptanalysis? Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF statistical cryptanalysis, Block ciphers, linear cryptanalysis
75Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF fault infective CRT, fault tolerance, cryptography, fault detection, side channel attack, factorization, Chinese Remainder Theorem (CRT), residue number system, physical cryptanalysis, hardware fault cryptanalysis, denial of service attack
75Makoto Sugita, Kazukuni Kobara, Hideki Imai Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Block Cipher Camellia, Truncated Differential Cryptanalysis, Impossible Differential Cryptanalysis
75Carlo Harpes, Gerhard Kramer, James L. Massey A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF piling-up lemma, SAFER K-64, differential cryptanalysis, Linear cryptanalysis, IDEA
73Raphael C.-W. Phan, Sung-Ming Yen Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attacks and countermeasures in hardware and software, cryptanalysis, Advanced Encryption Standard, side-channel attacks, fault attacks
70Eli Biham On Matsui's Linear Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
69Meiqin Wang, Jorge Nakahara Jr., Yue Sun Cryptanalysis of the Full MMB Block Cipher. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MMB block cipher, square cryptanalysis, differential cryptanalysis, modular multiplication, linear cryptanalysis
67Ali Aydin Selçuk On Probability of Success in Linear and Differential Cryptanalysis. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Success probability, Block ciphers, Differential cryptanalysis, Linear cryptanalysis, Order statistics
67Nicolas T. Courtois The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF interpolation attack on block ciphers, fractional transformations, homographic functions, generalised linear cryptanalysis, bi-linear cryptanalysis, Block ciphers, AES, Rijndael, Feistel ciphers, multivariate equations
67Pascal Junod, Serge Vaudenay Optimal Key Ranking Procedures in a Statistical Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key ranking, statistical cryptanalysis, Neyman-Pearson lemma, linear cryptanalysis
62Sung-Ming Yen Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
62Seokhie Hong, Sangjin Lee 0002, Jongin Lim 0001, Jaechul Sung, Dong Hyeon Cheon, Inho Cho Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
58Jie Chen 0055, YuPu Hu, Yueyu Zhang Impossible differential cryptanalysis of Advanced Encryption Standard. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, block cipher, advanced encryption standard, impossible differential cryptanalysis
58Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multiple linear cryptanalysis, Advanced Encryption Standard, branch-and-bound, linear cryptanalysis, linear approximations, Serpent
56Lars R. Knudsen, Willi Meier Improved Differential Attacks on RC5. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Cipher, Differential cryptanalysis, Weak keys
56Raphael C.-W. Phan, Mohammad Umar Siddiqi A Framework for Describing Block Cipher Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF framework, cryptanalysis, generalization, Encryption, block ciphers, distinguishers
56Goce Jakimoski, Yvo Desmedt Related-Key Differential Cryptanalysis of 192-bit Key AES Variants. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF related keys, Markov ciphers, Advanced Encryption Standard, Differential cryptanalysis
56Thomas Pornin, Jacques Stern Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF A5/1, FPGA, cryptanalysis, stream cipher, GSM, trade-off
54Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Security Weaknesses of Certain Broadcast Encryption Schemes. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF time-memory-data trade-off, cryptanalysis, key management, broadcast encryption
54Beomsik Song, Huaxiong Wang, Jennifer Seberry A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Substitution-Permutation(SP) Networks, Subtitution Distance, Cryptanalysis, Rijndael
53Sébastien Kunz-Jacques, Frédéric Muller New Improvements of Davies-Murphy Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Helena Handschuh, Bart Preneel Blind Differential Cryptanalysis for Enhanced Power Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF combined cryptanalysis, blind cryptanalysis, side channel attacks, power analysis, differential cryptanalysis, Hamming weights
50Debra L. Cook, Moti Yung, Angelos D. Keromytis Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security analysis, differential cryptanalysis, linear cryptanalysis
50Nicolas T. Courtois, Gregory V. Bard Algebraic Cryptanalysis of the Data Encryption Standard. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF s5DES, solving overdefined and sparse systems of multivariate equations, ElimLin algorithm, Gröbner bases, logical cryptanalysis, block ciphers, AES, DES, SAT solvers, algebraic cryptanalysis
50Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MISTY, Provable Security, Differential Cryptanalysis, Linear Cryptanalysis, RC6, Feistel Network
50Liam Keliher Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SPN, MELP, MEDP, KMT2, KMT2-DC, AES, provable security, differential cryptanalysis, Rijndael, linear cryptanalysis
50Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee 0002 Differential Cryptanalysis of TEA and XTEA. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TEA, XTEA, truncated differential cryptanalysis, Block cipher, differential cryptanalysis
50Alex Biryukov, Adi Shamir Structural Cryptanalysis of SASAS. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Structural cryptanalysis, substitution permutation networks, substitution affine networks, Cryptanalysis, block ciphers, Rijndael
50Eli Biham, Alex Biryukov, Adi Shamir Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Skipjack, Cryptanalysis, Differential cryptanalysis, Impossible differentials
48Thomas Baignères, Serge Vaudenay Proving the Security of AES Substitution-Permutation Network. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Linear Hulls, Provable Security, Differential Cryptanalysis, Differentials, Linear Cryptanalysis
48Pascal Junod On the Optimality of Linear, Differential, and Sequential Distinguishers. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Differential cryptanalysis, Linear Cryptanalysis, Distinguishers, Statistical Hypothesis Testing
47Dmitry Khovratovich Cryptanalysis of Hash Functions with Structures. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF truncated differentials, Grindahl, Fugue, cryptanalysis, hash functions, structures, SHA-3
47Waseem Shahzad, Abdul Basit Siddiqui, Farrukh Aslam Khan Cryptanalysis of four-rounded DES using binary particleswarm optimization. Search on Bibsonomy GECCO (Companion) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ga, pso, cryptanalysis, des, fitness function
47Thomas Roche, Roland Gillard, Jean-Louis Roch Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipher. Search on Bibsonomy MCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Provable security, Impossible Differential cryptanalysis, Symmetric ciphers
47Jun Song 0003, Huanguo Zhang, Qingshu Meng, Zhang-yi Wang Cryptanalysis of Two-Round DES Using Genetic Algorithms. Search on Bibsonomy ISICA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF two-round DES, known plaintext attack, genetic algorithm, cryptanalysis, fitness function
47Mohamed Amine Garici, Habiba Drias Cryptanalysis of Substitution Ciphers Using Scatter Search. Search on Bibsonomy IWINAC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF automated cryptanalysis, substitution ciphers, genetic algorithm, heuristic search, optimization problem, scatter search, evolutionary approach
47Tanmoy Kanti Das, Jianying Zhou 0001 Cryptanalysis of Barni et al. Watermarking Scheme. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Watermark Recovery, Copy Attack, Cryptanalysis, Wavelet Transform
47Tanmoy Kanti Das, Subhamoy Maitra Cryptanalysis of "Wavelet Tree Quantization" Watermarking Scheme. Search on Bibsonomy IWDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cryptanalysis, Wavelet Transform, Information Security, Digital Watermarking, Multimedia Systems
47Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF FPGA, Cryptography, DES, linear cryptanalysis, efficient implementations
47Lars R. Knudsen, David A. Wagner 0001 Integral Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MISTY, integrals, Cryptanalysis, block ciphers
47Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari Linear Cryptanalysis of Bluetooth Stream Cipher. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF linear correlations, iterative probabilistic decoding, reinitialization, Linear cryptanalysis
47Tanmoy Kanti Das, Subhamoy Maitra Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cryptanalysis, Discrete Cosine Transform, Digital Watermarking, Subset Sum
45Gildas Avoine, Pascal Junod, Philippe Oechslin Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptanalysis, precomputation, Time-memory trade-off
45Miodrag J. Mihaljevic, Hideki Imai The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF overdefined systems of equations, hypotheses testing, cryptanalysis, stream ciphers, algebraic attacks, decimation
45Philippe Oechslin Making a Faster Cryptanalytic Time-Memory Trade-Off. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF fixed plaintext, cryptanalysis, precomputation, Time-memory trade-off
45Eli Biham New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45N. Nalini, G. Raghavendra Rao Cryptanalysis of Block Ciphers via Improved Simulated Annealing Technique. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Eli Biham, Orr Dunkelman, Nathan Keller Enhancing Differential-Linear Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
45Carlo Harpes, James L. Massey Partitioning Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
45Toshio Tokita, Tohru Sorimachi, Mitsuru Matsui Linear Cryptanalysis of LOKI and s2DES. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
45Luke O'Connor, Jovan Dj. Golic A Unified Markow Approach to Differential and Linear Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
45Gustavus J. Simmons Cryptanalysis and Protocol Failures (abstract). Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
39Luca Breveglieri, Alessandra Cherubini, Marco Macchetti On the Generalized Linear Equivalence of Functions Over Finite Fields. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF linear equivalence, APN functions, Boolean functions, differential cryptanalysis, S-boxes, linear cryptanalysis
39Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim 0001 New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Substitution-permutation networks, Branch number, Independent variables, Cryptography, AES, Differential cryptanalysis, Linear cryptanalysis, ARIA
39Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha Permanent Fault Attack on the Parameters of RSA with CRT. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Computational fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis
39Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha Hardware Fault Attackon RSA with CRT Revisited. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis
39Dong Hyeon Cheon, Seokhie Hong, Sangjin Lee 0002, Sung Jae Lee, Kyung Hwan Park, Seonhee Yoon Difference Distribution Attack on DONUT and Improved DONUT. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF DONUT, Differential Cryptanalysis(DC), Linear Cryptanalysis(LC), Difference Distribution Attack(DDA), Decorrelation
39Dong Hyeon Cheon, Sangjin Lee 0002, Jong In Lim 0001, Sung Jae Lee New Block Cipher DONUT Using Pairwise Perfect Decorrelation. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Differential Cryptanalysis (DC), Linear Cryptanalysis (LC), Block cipher, Decorrelation
39Kazumaro Aoki On Maximum Non-averaged Differential Probability. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF maximum average of differential probability, linear hull, maximum average of linear probability, maximum non-averaged differential probability, maximum non-averaged linear probability, DES-like cipher, Differential cryptanalysis, differential, linear cryptanalysis
39Philip Hawkes Differential-Linear Weak Key Classes of IDEA. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF differential-linear cryptanalysis, related-key cryptanalysis, IDEA, weak keys
39Waseem Shahzad, Abdul Basit Siddiqui, Farrukh Aslam Khan Cryptanalysis of four-rounded DES using binary particle swarm optimization. Search on Bibsonomy GECCO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, DES, GA, PSO, fitness function
39Elad Barkan, Eli Biham, Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ciphertext-only, SIM, A5/2, A5/1, Cryptanalysis, SMS, GSM, GPRS, Cellular
39Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MISTY1, Block cipher, Impossible differential cryptanalysis, Camellia
39Jun Song 0003, Fan Yang, Maocai Wang, Huanguo Zhang Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm. Search on Bibsonomy ISICA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intelligent computing, fitness evaluation weight mode, cryptanalysis, SAGA
39Fan Yang, Jun Song 0003, Huanguo Zhang Quantitative Cryptanalysis of Six-Round DES Using Evolutionary Algorithms. Search on Bibsonomy ISICA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Evolutionary cryptanalysis, Likelihood estimation, Evolutionary computation, Linear approximation
39Wenling Wu, Wentao Zhang, Dengguo Feng Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF block cipher, time complexity, data complexity, impossible differential cryptanalysis, ARIA, Camellia
39Haijian Zhou, Ping Luo, Daoshun Wang, Yiqi Dai Cryptanalysis of General Lu-Lee Type Systems. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Lu-Lee type systems, cryptanalysis, lattice reduction
39Louis Goubin, Jean-Michel Masereel, Michaël Quisquater Cryptanalysis of White Box DES Implementations. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, block cipher, DES, Obfuscation, symmetric cryptography
39Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF White-Box Cryptography, Cryptanalysis, DES, Data Encryption Standard, Obfuscation
39Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk Cryptanalysis of FORK-256. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FORK-256, micro-collisions, cryptanalysis, hash functions
39Alexander Maximov On Large Distributions for Linear Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF large distributions, pseudo-linear functions, approximations, Linear cryptanalysis, complexity reduction
39Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater Improving the Time Complexity of Matsui's Linear Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fast Fourier Transform, block ciphers, linear cryptanalysis
39Gwenaëlle Martinet, Guillaume Poupard, Philippe Sola Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF partially blind signature, Cryptanalysis, electronic cash
39Yaniv Shaked, Avishai Wool Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream cipher, Bluetooth, BDD
39Ludovic Perret A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Isomorphism of Polynomials with One Secret (IP1S), Polynomial Linear Equivalence (PLE), Cryptanalysis, Jacobian Matrix
39Werner Schindler, Kerstin Lemke, Christof Paar A Stochastic Model for Differential Side Channel Cryptanalysis. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Differential Side Channel Cryptanalysis, Minimum Principle, Maximum Likelihood Principle, Stochastic Model, DPA, Power Analysis, DEMA, Template Attack, Electromagnetic Analysis
39Tanmoy Kanti Das, Jianying Zhou 0001, Subhamoy Maitra Cryptanalysis of a Wavelet Based Watermarking Scheme. Search on Bibsonomy IWDW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cryptanalysis, Wavelet Transform, Correlation, Digital Watermarking
39Simon R. Blackburn, Kenneth G. Paterson Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptanalysis, MAC, Message authentication, matrix groups, birthday paradox
39Nicolas T. Courtois, Josef Pieprzyk Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MQ problem, overdefined systems of multivariate equations, Gröbner bases, sparse multivariate polynomials, Multivariate Cryptanalysis, Block ciphers, AES, Rijndael, Square, Camellia, Serpent, XL algorithm, multivariate quadratic equations
39Henri Gilbert, Marine Minier Cryptanalysis of SFLASH. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF asymmetric signature, cryptanalysis, multivariate polynomials, SFLASH
39Craig Gentry, Michael Szydlo Cryptanalysis of the Revised NTRU Signature Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF NSS, NTRUSign, Orthogonal Lattice, Cyclotomic Integer, Galois Congruence, Cryptanalysis, Signature Scheme, Lattice Reduction, NTRU
39Anne Canteaut, Marion Videau Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF higher order differential cryptanalysis, Boolean functions, Block ciphers, nonlinearity
39Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cryptanalysis, public key cryptosystem, finite automaton
39Adi Shamir Visual Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF visual computation, bit slice computation, parallel computers, Cryptanalysis, quantum computers, DNA computers, photography
39Alex Biryukov, Eyal Kushilevitz Improved Cryptanalysis of RC5. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF RGS, Block ciphers, differential cryptanalysis
39John Kelsey, Bruce Schneier, David A. Wagner 0001, Chris Hall Side Channel Cryptanalysis of Product Ciphers. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF product ciphers, cryptanalysis, timing attacks, side channels
39Thomas Jakobson Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF interpolation attack, non-linear relations, Sudan's algorithm, Cryptanalysis, block cipher, Reed-Solomon codes
37Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. Search on Bibsonomy AAECC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF overdefined systems of nonlinear equations, state transition matrix, cryptanalysis, stream ciphers, decoding, LFSRs, algebraic attacks, fast correlation attack, decimation, keystream generators
37Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen On the Collision Resistance of RIPEMD-160. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RIPEMD-160, low-weight codewords, cryptanalysis, hash function, collision attack, differential attack
37Phong Q. Nguyen, Damien Stehlé Floating-Point LLL Revisited. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF L3, Lattice Reduction, LLL, Public-Key Cryptanalysis
37Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Exploiting Coding Theory for Collision Attacks on SHA-1. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF low-weight vector, cryptanalysis, hash function, collision, Linear code, SHA-1
37Paul Camion, Miodrag J. Mihaljevic, Hideki Imai Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF linear feedback shift registers over GF(), nonlinear combination generator, cryptanalysis, resilient functions, keystream generators
37Luke O'Connor On the Distribution of Characteristics in Bijective Mappings. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF iterated mapping, product cipher, Differential cryptanalysis
37Luke O'Connor On the Distribution of Characteristics in Composite Permutations. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF iterated mapping, product cipher, Differential cryptanalysis
36Kenji Ohkuma Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Guilhem Castagnos, Fabien Laguillaumie On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Polynomial time total break, quadratic decryption, NICE cryptosystems, imaginary quadratic field-based cryptography
Displaying result #1 - #100 of 4217 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license