|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2108 occurrences of 562 keywords
|
|
|
Results
Found 4217 publication records. Showing 4217 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
96 | David A. Wagner 0001 |
Towards a Unifying View of Block Cipher Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 16-33, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
92 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 397-413, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis |
87 | Xuejia Lai, James L. Massey, Sean Murphy |
Markov Ciphers and Differential Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 17-38, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
84 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 414-427, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Square-multiply exponentiation, Cryptography, Side channel attack, Exponentiation, Timing attack, Power analysis attack, Physical cryptanalysis, Hardware fault cryptanalysis |
75 | Thomas Baignères, Pascal Junod, Serge Vaudenay |
How Far Can We Go Beyond Linear Cryptanalysis? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 432-450, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
statistical cryptanalysis, Block ciphers, linear cryptanalysis |
75 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 52(4), pp. 461-472, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
fault infective CRT, fault tolerance, cryptography, fault detection, side channel attack, factorization, Chinese Remainder Theorem (CRT), residue number system, physical cryptanalysis, hardware fault cryptanalysis, denial of service attack |
75 | Makoto Sugita, Kazukuni Kobara, Hideki Imai |
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 193-207, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Block Cipher Camellia, Truncated Differential Cryptanalysis, Impossible Differential Cryptanalysis |
75 | Carlo Harpes, Gerhard Kramer, James L. Massey |
A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding, pp. 24-38, 1995, Springer, 3-540-59409-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
piling-up lemma, SAFER K-64, differential cryptanalysis, Linear cryptanalysis, IDEA |
73 | Raphael C.-W. Phan, Sung-Ming Yen |
Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 135-150, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Attacks and countermeasures in hardware and software, cryptanalysis, Advanced Encryption Standard, side-channel attacks, fault attacks |
70 | Eli Biham |
On Matsui's Linear Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings, pp. 341-355, 1994, Springer, 3-540-60176-7. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
69 | Meiqin Wang, Jorge Nakahara Jr., Yue Sun |
Cryptanalysis of the Full MMB Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 231-248, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
MMB block cipher, square cryptanalysis, differential cryptanalysis, modular multiplication, linear cryptanalysis |
67 | Ali Aydin Selçuk |
On Probability of Success in Linear and Differential Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(1), pp. 131-147, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Success probability, Block ciphers, Differential cryptanalysis, Linear cryptanalysis, Order statistics |
67 | Nicolas T. Courtois |
The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Conference ![In: Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers, pp. 170-188, 2004, Springer, 3-540-26557-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
interpolation attack on block ciphers, fractional transformations, homographic functions, generalised linear cryptanalysis, bi-linear cryptanalysis, Block ciphers, AES, Rijndael, Feistel ciphers, multivariate equations |
67 | Pascal Junod, Serge Vaudenay |
Optimal Key Ranking Procedures in a Statistical Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 235-246, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Key ranking, statistical cryptanalysis, Neyman-Pearson lemma, linear cryptanalysis |
62 | Sung-Ming Yen |
Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 106-117, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
62 | Seokhie Hong, Sangjin Lee 0002, Jongin Lim 0001, Jaechul Sung, Dong Hyeon Cheon, Inho Cho |
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, pp. 273-283, 2000, Springer, 3-540-41728-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
58 | Jie Chen 0055, YuPu Hu, Yueyu Zhang |
Impossible differential cryptanalysis of Advanced Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 50(3), pp. 342-350, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, block cipher, advanced encryption standard, impossible differential cryptanalysis |
58 | Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater |
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 51-65, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multiple linear cryptanalysis, Advanced Encryption Standard, branch-and-bound, linear cryptanalysis, linear approximations, Serpent |
56 | Lars R. Knudsen, Willi Meier |
Improved Differential Attacks on RC5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 216-228, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Cipher, Differential cryptanalysis, Weak keys |
56 | Raphael C.-W. Phan, Mohammad Umar Siddiqi |
A Framework for Describing Block Cipher Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(11), pp. 1402-1409, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
framework, cryptanalysis, generalization, Encryption, block ciphers, distinguishers |
56 | Goce Jakimoski, Yvo Desmedt |
Related-Key Differential Cryptanalysis of 192-bit Key AES Variants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers, pp. 208-221, 2003, Springer, 3-540-21370-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
related keys, Markov ciphers, Advanced Encryption Standard, Differential cryptanalysis |
56 | Thomas Pornin, Jacques Stern |
Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, pp. 318-327, 2000, Springer, 3-540-41455-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
A5/1, FPGA, cryptanalysis, stream cipher, GSM, trade-off |
54 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Security Weaknesses of Certain Broadcast Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DRMTICS ![In: Digital Rights Management: Technologies, Issues, Challenges and Systems, First International Conference, DRMTICS 2005, Sydney, Australia, October 31 - November 2, 2005, Revised Selected Papers, pp. 228-245, 2005, Springer, 3-540-35998-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
time-memory-data trade-off, cryptanalysis, key management, broadcast encryption |
54 | Beomsik Song, Huaxiong Wang, Jennifer Seberry |
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings, pp. 18-31, 2001, Springer, 3-540-43319-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Substitution-Permutation(SP) Networks, Subtitution Distance, Cryptanalysis, Rijndael |
53 | Sébastien Kunz-Jacques, Frédéric Muller |
New Improvements of Davies-Murphy Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 425-442, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Helena Handschuh, Bart Preneel |
Blind Differential Cryptanalysis for Enhanced Power Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers, pp. 163-173, 2006, Springer, 978-3-540-74461-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
combined cryptanalysis, blind cryptanalysis, side channel attacks, power analysis, differential cryptanalysis, Hamming weights |
50 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 187-202, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security analysis, differential cryptanalysis, linear cryptanalysis |
50 | Nicolas T. Courtois, Gregory V. Bard |
Algebraic Cryptanalysis of the Data Encryption Standard. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings, pp. 152-169, 2007, Springer, 978-3-540-77271-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
s5DES, solving overdefined and sparse systems of multivariate equations, ElimLin algorithm, Gröbner bases, logical cryptanalysis, block ciphers, AES, DES, SAT solvers, algebraic cryptanalysis |
50 | Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 446-455, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
MISTY, Provable Security, Differential Cryptanalysis, Linear Cryptanalysis, RC6, Feistel Network |
50 | Liam Keliher |
Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Conference ![In: Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers, pp. 42-57, 2004, Springer, 3-540-26557-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
SPN, MELP, MEDP, KMT2, KMT2-DC, AES, provable security, differential cryptanalysis, Rijndael, linear cryptanalysis |
50 | Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee 0002 |
Differential Cryptanalysis of TEA and XTEA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 402-417, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
TEA, XTEA, truncated differential cryptanalysis, Block cipher, differential cryptanalysis |
50 | Alex Biryukov, Adi Shamir |
Structural Cryptanalysis of SASAS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2001, International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, May 6-10, 2001, Proceeding, pp. 394-405, 2001, Springer, 3-540-42070-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Structural cryptanalysis, substitution permutation networks, substitution affine networks, Cryptanalysis, block ciphers, Rijndael |
50 | Eli Biham, Alex Biryukov, Adi Shamir |
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '99, International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceeding, pp. 12-23, 1999, Springer, 3-540-65889-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Skipjack, Cryptanalysis, Differential cryptanalysis, Impossible differentials |
48 | Thomas Baignères, Serge Vaudenay |
Proving the Security of AES Substitution-Permutation Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005, Revised Selected Papers, pp. 65-81, 2005, Springer, 3-540-33108-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Linear Hulls, Provable Security, Differential Cryptanalysis, Differentials, Linear Cryptanalysis |
48 | Pascal Junod |
On the Optimality of Linear, Differential, and Sequential Distinguishers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 17-32, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Differential cryptanalysis, Linear Cryptanalysis, Distinguishers, Statistical Hypothesis Testing |
47 | Dmitry Khovratovich |
Cryptanalysis of Hash Functions with Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 108-125, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
truncated differentials, Grindahl, Fugue, cryptanalysis, hash functions, structures, SHA-3 |
47 | Waseem Shahzad, Abdul Basit Siddiqui, Farrukh Aslam Khan |
Cryptanalysis of four-rounded DES using binary particleswarm optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2009, Proceedings, Montreal, Québec, Canada, July 8-12, 2009, Companion Material, pp. 2161-2166, 2009, ACM, 978-1-60558-505-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ga, pso, cryptanalysis, des, fitness function |
47 | Thomas Roche, Roland Gillard, Jean-Louis Roch |
Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MCO ![In: Modelling, Computation and Optimization in Information Systems and Management Sciences, Second International Conference, MCO 2008, Metz, France - Luxembourg, September 8-10, 2008. Proceedings, pp. 597-606, 2008, Springer, 978-3-540-87476-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Provable security, Impossible Differential cryptanalysis, Symmetric ciphers |
47 | Jun Song 0003, Huanguo Zhang, Qingshu Meng, Zhang-yi Wang |
Cryptanalysis of Two-Round DES Using Genetic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICA ![In: Advances in Computation and Intelligence, Second International Symposium, ISICA 2007, Wuhan, China, September 21-23, 2007, Proceedings, pp. 583-590, 2007, Springer, 978-3-540-74580-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
two-round DES, known plaintext attack, genetic algorithm, cryptanalysis, fitness function |
47 | Mohamed Amine Garici, Habiba Drias |
Cryptanalysis of Substitution Ciphers Using Scatter Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWINAC (2) ![In: Artificial Intelligence and Knowledge Engineering Applications: A Bioinspired Approach: First International Work-Conference on the Interplay Between Natural and Artificial Computation, IWINAC 2005, Las Palmas, Canary Islands, Spain, June 15-18, 2005, Proceedings, Part II, pp. 31-40, 2005, Springer, 3-540-26319-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
automated cryptanalysis, substitution ciphers, genetic algorithm, heuristic search, optimization problem, scatter search, evolutionary approach |
47 | Tanmoy Kanti Das, Jianying Zhou 0001 |
Cryptanalysis of Barni et al. Watermarking Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings, pp. 197-208, 2005, Springer, 3-540-30805-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Watermark Recovery, Copy Attack, Cryptanalysis, Wavelet Transform |
47 | Tanmoy Kanti Das, Subhamoy Maitra |
Cryptanalysis of "Wavelet Tree Quantization" Watermarking Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDC ![In: Distributed Computing - IWDC 2004, 6th International Workshop, Kolkata, India, December 27-30, 2004, Proceedings, pp. 219-230, 2004, Springer, 3-540-24076-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Wavelet Transform, Information Security, Digital Watermarking, Multimedia Systems |
47 | Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat |
Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 52(4), pp. 473-482, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
FPGA, Cryptography, DES, linear cryptanalysis, efficient implementations |
47 | Lars R. Knudsen, David A. Wagner 0001 |
Integral Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers, pp. 112-127, 2002, Springer, 3-540-44009-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
MISTY, integrals, Cryptanalysis, block ciphers |
47 | Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari |
Linear Cryptanalysis of Bluetooth Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 238-255, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
linear correlations, iterative probabilistic decoding, reinitialization, Linear cryptanalysis |
47 | Tanmoy Kanti Das, Subhamoy Maitra |
Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 135-148, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Discrete Cosine Transform, Digital Watermarking, Subset Sum |
45 | Gildas Avoine, Pascal Junod, Philippe Oechslin |
Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2005, 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings, pp. 183-196, 2005, Springer, 3-540-30805-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
cryptanalysis, precomputation, Time-memory trade-off |
45 | Miodrag J. Mihaljevic, Hideki Imai |
The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected Papers, pp. 310-323, 2004, Springer, 3-540-24301-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
overdefined systems of equations, hypotheses testing, cryptanalysis, stream ciphers, algebraic attacks, decimation |
45 | Philippe Oechslin |
Making a Faster Cryptanalytic Time-Memory Trade-Off. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 617-630, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
fixed plaintext, cryptanalysis, precomputation, Time-memory trade-off |
45 | Eli Biham |
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 444-461, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | N. Nalini, G. Raghavendra Rao |
Cryptanalysis of Block Ciphers via Improved Simulated Annealing Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: 9th International Conference in Information Technology, ICIT 2006, Bhubaneswar, Orissa, India, 18-21 December 2006, pp. 182-185, 2006, IEEE Computer Society, 0-7695-2635-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Eli Biham, Orr Dunkelman, Nathan Keller |
Enhancing Differential-Linear Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 254-266, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
45 | Carlo Harpes, James L. Massey |
Partitioning Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings, pp. 13-27, 1997, Springer, 3-540-63247-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
45 | Toshio Tokita, Tohru Sorimachi, Mitsuru Matsui |
Linear Cryptanalysis of LOKI and s2DES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings, pp. 293-303, 1994, Springer, 3-540-59339-X. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
45 | Luke O'Connor, Jovan Dj. Golic |
A Unified Markow Approach to Differential and Linear Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '94, 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28 - December 1, 1994, Proceedings, pp. 387-397, 1994, Springer, 3-540-59339-X. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
45 | Gustavus J. Simmons |
Cryptanalysis and Protocol Failures (abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993., pp. 213-214, 1993, ACM, 0-89791-629-8. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
39 | Luca Breveglieri, Alessandra Cherubini, Marco Macchetti |
On the Generalized Linear Equivalence of Functions Over Finite Fields. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 79-91, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
linear equivalence, APN functions, Boolean functions, differential cryptanalysis, S-boxes, linear cryptanalysis |
39 | Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim 0001 |
New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 21-32, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Substitution-permutation networks, Branch number, Independent variables, Cryptography, AES, Differential cryptanalysis, Linear cryptanalysis, ARIA |
39 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Permanent Fault Attack on the Parameters of RSA with CRT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 285-296, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Computational fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
39 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Hardware Fault Attackon RSA with CRT Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 374-388, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
39 | Dong Hyeon Cheon, Seokhie Hong, Sangjin Lee 0002, Sung Jae Lee, Kyung Hwan Park, Seonhee Yoon |
Difference Distribution Attack on DONUT and Improved DONUT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings, pp. 37-48, 2000, Springer, 3-540-41782-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
DONUT, Differential Cryptanalysis(DC), Linear Cryptanalysis(LC), Difference Distribution Attack(DDA), Decorrelation |
39 | Dong Hyeon Cheon, Sangjin Lee 0002, Jong In Lim 0001, Sung Jae Lee |
New Block Cipher DONUT Using Pairwise Perfect Decorrelation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings, pp. 262-270, 2000, Springer, 3-540-41452-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Differential Cryptanalysis (DC), Linear Cryptanalysis (LC), Block cipher, Decorrelation |
39 | Kazumaro Aoki |
On Maximum Non-averaged Differential Probability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings, pp. 118-130, 1998, Springer, 3-540-65894-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
maximum average of differential probability, linear hull, maximum average of linear probability, maximum non-averaged differential probability, maximum non-averaged linear probability, DES-like cipher, Differential cryptanalysis, differential, linear cryptanalysis |
39 | Philip Hawkes |
Differential-Linear Weak Key Classes of IDEA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 112-126, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
differential-linear cryptanalysis, related-key cryptanalysis, IDEA, weak keys |
39 | Waseem Shahzad, Abdul Basit Siddiqui, Farrukh Aslam Khan |
Cryptanalysis of four-rounded DES using binary particle swarm optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2009, Proceedings, Montreal, Québec, Canada, July 8-12, 2009, pp. 1757-1758, 2009, ACM, 978-1-60558-325-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, DES, GA, PSO, fitness function |
39 | Elad Barkan, Eli Biham, Nathan Keller |
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(3), pp. 392-429, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Ciphertext-only, SIM, A5/2, A5/1, Cryptanalysis, SMS, GSM, GPRS, Cellular |
39 | Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman |
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings, pp. 370-386, 2008, Springer, 978-3-540-79262-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
MISTY1, Block cipher, Impossible differential cryptanalysis, Camellia |
39 | Jun Song 0003, Fan Yang, Maocai Wang, Huanguo Zhang |
Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICA ![In: Advances in Computation and Intelligence, Third International Symposium, ISICA 2008, Wuhan, China, December 19-21, 2008 Proceedings, pp. 795-802, 2008, Springer, 978-3-540-92136-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
intelligent computing, fitness evaluation weight mode, cryptanalysis, SAGA |
39 | Fan Yang, Jun Song 0003, Huanguo Zhang |
Quantitative Cryptanalysis of Six-Round DES Using Evolutionary Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICA ![In: Advances in Computation and Intelligence, Third International Symposium, ISICA 2008, Wuhan, China, December 19-21, 2008 Proceedings, pp. 134-141, 2008, Springer, 978-3-540-92136-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Evolutionary cryptanalysis, Likelihood estimation, Evolutionary computation, Linear approximation |
39 | Wenling Wu, Wentao Zhang, Dengguo Feng |
Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 22(3), pp. 449-456, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
block cipher, time complexity, data complexity, impossible differential cryptanalysis, ARIA, Camellia |
39 | Haijian Zhou, Ping Luo, Daoshun Wang, Yiqi Dai |
Cryptanalysis of General Lu-Lee Type Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 412-426, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Lu-Lee type systems, cryptanalysis, lattice reduction |
39 | Louis Goubin, Jean-Michel Masereel, Michaël Quisquater |
Cryptanalysis of White Box DES Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers, pp. 278-295, 2007, Springer, 978-3-540-77359-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, block cipher, DES, Obfuscation, symmetric cryptography |
39 | Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel |
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers, pp. 264-277, 2007, Springer, 978-3-540-77359-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
White-Box Cryptography, Cryptanalysis, DES, Data Encryption Standard, Obfuscation |
39 | Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk |
Cryptanalysis of FORK-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers, pp. 19-38, 2007, Springer, 978-3-540-74617-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
FORK-256, micro-collisions, cryptanalysis, hash functions |
39 | Alexander Maximov |
On Large Distributions for Linear Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 89-101, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
large distributions, pseudo-linear functions, approximations, Linear cryptanalysis, complexity reduction |
39 | Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater |
Improving the Time Complexity of Matsui's Linear Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings, pp. 77-88, 2007, Springer, 978-3-540-76787-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Fast Fourier Transform, block ciphers, linear cryptanalysis |
39 | Gwenaëlle Martinet, Guillaume Poupard, Philippe Sola |
Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp. 171-176, 2006, Springer, 3-540-46255-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
partially blind signature, Cryptanalysis, electronic cash |
39 | Yaniv Shaked, Avishai Wool |
Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 187-202, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Stream cipher, Bluetooth, BDD |
39 | Ludovic Perret |
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 354-370, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Isomorphism of Polynomials with One Secret (IP1S), Polynomial Linear Equivalence (PLE), Cryptanalysis, Jacobian Matrix |
39 | Werner Schindler, Kerstin Lemke, Christof Paar |
A Stochastic Model for Differential Side Channel Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings, pp. 30-46, 2005, Springer, 3-540-28474-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Differential Side Channel Cryptanalysis, Minimum Principle, Maximum Likelihood Principle, Stochastic Model, DPA, Power Analysis, DEMA, Template Attack, Electromagnetic Analysis |
39 | Tanmoy Kanti Das, Jianying Zhou 0001, Subhamoy Maitra |
Cryptanalysis of a Wavelet Based Watermarking Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, Third InternationalWorkshop, IWDW 2004, Seoul, SouthKorea, October 30 - November 1, 2004, Revised Selected Papers, pp. 192-203, 2004, Springer, 3-540-24839-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Wavelet Transform, Correlation, Digital Watermarking |
39 | Simon R. Blackburn, Kenneth G. Paterson |
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 446-453, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cryptanalysis, MAC, Message authentication, matrix groups, birthday paradox |
39 | Nicolas T. Courtois, Josef Pieprzyk |
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 267-287, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
MQ problem, overdefined systems of multivariate equations, Gröbner bases, sparse multivariate polynomials, Multivariate Cryptanalysis, Block ciphers, AES, Rijndael, Square, Camellia, Serpent, XL algorithm, multivariate quadratic equations |
39 | Henri Gilbert, Marine Minier |
Cryptanalysis of SFLASH. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 288-298, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
asymmetric signature, cryptanalysis, multivariate polynomials, SFLASH |
39 | Craig Gentry, Michael Szydlo |
Cryptanalysis of the Revised NTRU Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 299-320, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
NSS, NTRUSign, Orthogonal Lattice, Cyclotomic Integer, Galois Congruence, Cryptanalysis, Signature Scheme, Lattice Reduction, NTRU |
39 | Anne Canteaut, Marion Videau |
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 518-533, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
higher order differential cryptanalysis, Boolean functions, Block ciphers, nonlinearity |
39 | Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam |
Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings, pp. 227-241, 1998, Springer, 3-540-65109-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
cryptanalysis, public key cryptosystem, finite automaton |
39 | Adi Shamir |
Visual Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 201-210, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
visual computation, bit slice computation, parallel computers, Cryptanalysis, quantum computers, DNA computers, photography |
39 | Alex Biryukov, Eyal Kushilevitz |
Improved Cryptanalysis of RC5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding, pp. 85-99, 1998, Springer, 3-540-64518-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
RGS, Block ciphers, differential cryptanalysis |
39 | John Kelsey, Bruce Schneier, David A. Wagner 0001, Chris Hall |
Side Channel Cryptanalysis of Product Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 98, 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings, pp. 97-110, 1998, Springer, 3-540-65004-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
product ciphers, cryptanalysis, timing attacks, side channels |
39 | Thomas Jakobson |
Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 212-222, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
interpolation attack, non-linear relations, Sudan's algorithm, Cryptanalysis, block cipher, Reed-Solomon codes |
37 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAECC ![In: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes, 16th International Symposium, AAECC-16, Las Vegas, NV, USA, February 20-24, 2006, Proceedings, pp. 203-214, 2006, Springer, 3-540-31423-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
overdefined systems of nonlinear equations, state transition matrix, cryptanalysis, stream ciphers, decoding, LFSRs, algebraic attacks, fast correlation attack, decimation, keystream generators |
37 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
On the Collision Resistance of RIPEMD-160. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 101-116, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
RIPEMD-160, low-weight codewords, cryptanalysis, hash function, collision attack, differential attack |
37 | Phong Q. Nguyen, Damien Stehlé |
Floating-Point LLL Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 215-233, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
L3, Lattice Reduction, LLL, Public-Key Cryptanalysis |
37 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Exploiting Coding Theory for Collision Attacks on SHA-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings, pp. 78-95, 2005, Springer, 3-540-30276-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
low-weight vector, cryptanalysis, hash function, collision, Linear code, SHA-1 |
37 | Paul Camion, Miodrag J. Mihaljevic, Hideki Imai |
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers, pp. 196-213, 2002, Springer, 3-540-00622-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
linear feedback shift registers over GF(), nonlinear combination generator, cryptanalysis, resilient functions, keystream generators |
37 | Luke O'Connor |
On the Distribution of Characteristics in Bijective Mappings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings, pp. 360-370, 1993, Springer, 3-540-57600-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
iterated mapping, product cipher, Differential cryptanalysis |
37 | Luke O'Connor |
On the Distribution of Characteristics in Composite Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pp. 403-412, 1993, Springer, 3-540-57766-1. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
iterated mapping, product cipher, Differential cryptanalysis |
36 | Kenji Ohkuma |
Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 249-265, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Guilhem Castagnos, Fabien Laguillaumie |
On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 260-277, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Polynomial time total break, quadratic decryption, NICE cryptosystems, imaginary quadratic field-based cryptography |
Displaying result #1 - #100 of 4217 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|