The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Plaintext with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1985 (20) 1986-1989 (21) 1990-1991 (18) 1992-1994 (23) 1995-1997 (19) 1998 (16) 1999 (25) 2000 (15) 2001 (22) 2002 (36) 2003 (36) 2004 (35) 2005 (62) 2006 (57) 2007 (58) 2008 (67) 2009 (53) 2010-2011 (21) 2012-2013 (29) 2014-2015 (28) 2016 (18) 2017-2018 (33) 2019 (27) 2020 (28) 2021 (23) 2022 (17) 2023 (19) 2024 (5)
Publication types (Num. hits)
article(229) incollection(10) inproceedings(591) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 543 occurrences of 294 keywords

Results
Found 831 publication records. Showing 831 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
85Isamu Teranishi, Wakaha Ogata Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Statistical Plaintext Awareness, Cramer-Shoup Scheme, Standard Model
73James Birkett, Alexander W. Dent Relations Among Notions of Plaintext Awareness. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
73Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng An Efficient Known Plaintext Attack on FEA-M. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
73Michael Stay ZIP Attacks with Reduced Known Plaintext. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
73Anne Tardy-Corfdir, Henri Gilbert A Known Plaintext Attack of FEAL-4 and FEAL-6. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
67Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IDEA and MESH ciphers, known-plaintext attack, Cryptanalysis
67Yasuyuki Murakami, Tatsuo Douzono, Takeshi Nasako Relationship between weight of plaintext and successful attacks in knapsack cryptosystems. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF knapsack public-key cryptosystem, low-density attack, weight of plaintext, density
64Paul C. van Oorschot, Michael J. Wiener A Known Plaintext Attack on Two-Key Triple Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF Triple encryption, cryptanalysis, DES
61Tzonelih Hwang, T. R. N. Rao Secret Error-Correcting Codes (SECC). Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity
58Gregory V. Bard Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Modes of Encryption, Blockwise-Adaptive Chosen-Plaintext Attack, BACPA, MACPA, Online-ness, CBC, CTR, OFB, CFB, IGE, HCBC, HPCBC, XCBC, ABC, ECB
58Isamu Teranishi, Wakaha Ogata Relationship Between Standard Model Plaintext Awareness and Message Hiding. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Standard Model, Plaintext Awareness
55Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF FPGA, Cryptography, DES, linear cryptanalysis, efficient implementations
55Reihaneh Safavi-Naini, Leonid M. Tombak Authentication Codes in Plaintext and Chosen-content Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
55Ivan Damgård, Jesper Buus Nielsen Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
49Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway Relations Among Notions of Security for Public-Key Encryption Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Asymmetric encryption, Rackoff-Simon attack, Relations among definitions, Chosen ciphertext security, Non-malleability, Plaintext awareness
49Keita Xagawa, Keisuke Tanaka Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF proof of plaintext knowledge, identification, code, zero knowledge, proof of knowledge, NTRU, lattice-based cryptography
46Jacques Patarin Security of Random Feistel Schemes with 5 or More Rounds. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Jacques Patarin Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
46Thomas Jakobson Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF interpolation attack, non-linear relations, Sudan's algorithm, Cryptanalysis, block cipher, Reed-Solomon codes
46Martin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson Plaintext Recovery Attacks against SSH. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46Min-Sung Koh, Esteban Rodriguez-Marek, Claudio Talarico A Novel Data Dependent Multimedia Encryption Algorithm Secure Against Chosen-Plaintext Attacks. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46H. D. Phaneendra, C. Vidya Raj, M. S. Shivakumar Applying Quantum Search to a Known-Plaintext Attack on Two-Key Triple Encryption. Search on Bibsonomy Intelligent Information Processing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Quantum algorithm, exhaustive search, Quantum mechanics, qubits, Quantum search, 3DES
46Alexander W. Dent The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Jonathan Herzog, Moses D. Liskov, Silvio Micali Plaintext Awareness via Key Registration. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
40Dominik Engel, Rade Kutil, Andreas Uhl A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ciphertext-only, known-plaintext, secret frequency domain, secret parameterized wavelet filters, attack, JPEG2000
40Eun-Jun Yoon, Kee-Young Yoo An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority. Search on Bibsonomy SOFSEM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Self-certified public key, Known plaintext-ciphertext attack, Cryptography, Digital signature, Message recovery
40Martijn Stam A Key Encapsulation Mechanism for NTRU. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Key Encapsulation, Random Oracle Model, NTRU, Plaintext Awareness
40Siguna Müller On the Security of Williams Based Public Key Encryption Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF (Weak)- Sole-Samplability, Factorization Intractability, Oracle Hashing, Williams' Encryption Scheme, Chosen Ciphertext Security, Plaintext Awareness
40B. John Oommen, Jack R. Zgierski Breaking Substitution Cyphers Using Stochastic Automata. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF substitution cyphers, finite plaintext alphabet, cypher alphabet, unigrams, trigrams, automaton solution, cypher learning automaton, learning, cryptography, learning systems, cardinality, stochastic automata, stochastic automata, statistical information, relaxation theory, relaxation scheme
40T. R. N. Rao, Kil-Hyun Nam Private-Key Algebraic-Coded Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF private-key cryptosystems, Algebraic codes, crypto-complexity, Joint Encryption and Error-control Coding, public-key cryptosystems, cryptosystems, chosen-plaintext attack
37Jonathan Katz, Moti Yung Characterization of Security Notions for Probabilistic Private-Key Encryption. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Private-key encryptions, Definitions
37Kenneth G. Paterson, Arnold K. L. Yau Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF padding oracle attack, CBC-mode encryption, ISO standard
37Goce Jakimoski, Yvo Desmedt Related-Key Differential Cryptanalysis of 192-bit Key AES Variants. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF related keys, Markov ciphers, Advanced Encryption Standard, Differential cryptanalysis
37Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier New Attacks on PKCS#1 v1.5 Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
37Serge Vaudenay Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
37Ueli M. Maurer A Provably-Secure Strongly-Randomized Cipher. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
37A. F. Webster, Stafford E. Tavares On the Design of S-Boxes. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
37A. K. Leung, Stafford E. Tavares Sequence Complexity as a Test for Cryptographic Systems. Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
37Jan Camenisch, Nishanth Chandran, Victor Shoup A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Martin Hlavác Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Montgomery exponentiation, electronic passport, RSA, side channel attack, Chinese Remainder Theorem, Hidden Number Problem
37Shafi Goldwasser, Dmitriy Kharchenko Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen Chosen-Plaintext Cryptanalysis of a Clipped-Neural-Network-Based Chaotic Cipher. Search on Bibsonomy ISNN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Kazuhiko Minematsu, Yukiyasu Tsunoo Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
37Mihir Bellare, Adriana Palacio Towards Plaintext-Aware Public-Key Encryption Without Random Oracles. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
37John Kelsey Compression and Information Leakage of Plaintext. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37Atsuko Miyaji, Masao Nonaka, Yoshinori Takii Known Plaintext Correlation Attack against RC5. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
37David A. McGrew, Scott R. Fluhrer Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
37René Struik, Johan van Tilburg The Rao-Nam Scheme is Insecure Against a Chosen-Plaintext Attack. Search on Bibsonomy CRYPTO The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
37Takuya Suzuki, Hayato Yamana PCPR: Plaintext Compression and Plaintext Reconstruction for Reducing Memory Consumption on Homomorphically Encrypted CNN. Search on Bibsonomy AINA (4) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
37David A. McGrew Impossible plaintext cryptanalysis and probable-plaintext collision attacks of 64-bit block cipher modes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
37Herbert S. Bright Cryptanalytic Attack and Defense: Ciphertext-Only, Known-Plaintext, Chosen-Plaintext. Search on Bibsonomy Cryptologia The full citation details ... 1977 DBLP  DOI  BibTeX  RDF
30S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan On the Security of Identity Based Ring Signcryption Schemes. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Ring Signcryption, Adaptive Chosen Ciphertext Attack, Cryptanalysis, Provable Security, Confidentiality, Bilinear Pairing, Random Oracle Model, Chosen Plaintext Attack
30Isamu Teranishi, Wakaha Ogata Relationship between Two Approaches for Defining the Standard Model PA-ness. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Standard Model, Plaintext Awareness
30Hidema Tanaka, Yasuo Hatano, Nobuyuki Sugio, Toshinobu Kaneko Security Analysis of MISTY1. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MISTY1, Higher order differential, Chosen plaintext attack
30Jun Song 0003, Huanguo Zhang, Qingshu Meng, Zhang-yi Wang Cryptanalysis of Two-Round DES Using Genetic Algorithms. Search on Bibsonomy ISICA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF two-round DES, known plaintext attack, genetic algorithm, cryptanalysis, fitness function
30Joydip Mitra A Near-Practical Attack Against B Mode of HBB. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF known-plaintext attack, HBB, cryptanalysis, stream cipher
30Feng Bao 0001 Cryptanalysis of a Partially Known Cellular Automata Cryptosystem. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptanalysis, Cellular automata, encryption, chosen-plaintext attack
30Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard Practical Symmetric On-Line Encryption. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF blockwise adversary, Symmetric encryption, chosen plaintext attacks
30Philippe Oechslin Making a Faster Cryptanalytic Time-Memory Trade-Off. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF fixed plaintext, cryptanalysis, precomputation, Time-memory trade-off
28Baudoin Collard, François-Xavier Standaert A Statistical Saturation Attack against the Block Cipher PRESENT. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Joana Treger, Jacques Patarin Generic Attacks on Feistel Networks with Internal Permutations. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Mihir Bellare, Chanathip Namprempre Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Message authentication, Authenticated encryption, Symmetric encryption, Concrete security
28Elaine Shi, Brent Waters Delegating Capabilities in Predicate Encryption Systems. Search on Bibsonomy ICALP (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28David Oranchak Evolutionary algorithm for decryption of monoalphabetic homophonic substitution ciphers encoded as constraint satisfaction problems. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF codebreaking, homophonic substitution, zodiac killer, zodiac murder ciphers, genetic algorithms, cryptography, evolutionary computing, constraint satisfaction
28Marek Klonowski, Przemyslaw Kubiak 0001, Miroslaw Kutylowski Practical Deniable Encryption. Search on Bibsonomy SOFSEM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF deniable encryption
28Hongjun Wu 0001, Bart Preneel Differential-Linear Attacks Against the Stream Cipher Phelix. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Neri Merhav On the shannon cipher system with a capacity-limited key-distribution channel. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unbalanced Feistel permutations, generic attacks, Luby-Rackoff theory, block ciphers, pseudo-random permutations
28Yevgeniy Dodis, Jonathan Katz Chosen-Ciphertext Security of Multiple Encryption. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Pascal Junod New Attacks Against Reduced-Round Versions of IDEA. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Demirci-Biryukov relation, Block ciphers, IDEA
28Ivan Damgård, Thomas Pedersen, Louis Salvail On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Adam L. Young, Moti Yung Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography
28Vlastimil Klíma, Tomás Rosa Further Results and Considerations on Side Channel Attacks on RSA. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Sami Vaarala, Antti Nuopponen, Teemupekka Virtanen Attacking Predictable IPsec ESP Initialization Vectors. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre Online Ciphers and the Hash-CBC Construction. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Johan Borst, Bart Preneel, Joos Vandewalle Linear Cryptanalysis of RC5 and RC6. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
28Adam L. Young, Moti Yung Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
28Tatsuaki Okamoto, Shigenori Uchiyama A New Public-Key Cryptosystem as Secure as Factoring. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
28Alex Biryukov, Eyal Kushilevitz From Differential Cryptanalysis to Ciphertext-Only Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Madryga, RC5, ciphertext-only attack, differential-linear attack, block-ciphers, DES, differential cryptanalysis
28Burton S. Kaliski Jr., Yiqun Lisa Yin On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
28Wenbo Mao, Colin Boyd On Strengthening Authentication Protocols to Foil Cryptanalysis. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
28Chae Hoon Lim, Pil Joong Lee Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
28Kazuo Ohta, Mitsuru Matsui Differential Attack on Message Authentication Codes. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
28S. M. Jennings Multiplexed Sequences: Some Properties of the Minimum Polynomial. Search on Bibsonomy EUROCRYPT The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
27Ueli M. Maurer, Johan Sjödin A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Maryam Arvandi, Alireza Sadeghian Chosen Plaintext Attack against Neural Network-Based Symmetric Cipher. Search on Bibsonomy IJCNN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Debasis Mazumdar, Soma Mitra, Sonali Dhali, Sankar K. Pal A Chosen Plaintext Steganalysis of Hide4PGP V 2.0. Search on Bibsonomy PReMI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Jonathan Katz Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Kazukuni Kobara, Hideki Imai New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Soichi Furuya Slide Attacks with a Known-Plaintext Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
27Lars R. Knudsen, John Erik Mathiassen A Chosen-Plaintext Linear Attack on DES. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27Henri Gilbert, Pascal Chauvaud A Chosen Plaintext Attack of the 16-round Khufu Cryptosystem. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
27Johan van Tilburg Two Chosen Plaintext Attacks on the Li-Wang Joint Authentication and Encryption Scheme. Search on Bibsonomy AAECC The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
27Mitsuru Matsui, Atsuhiro Yamagishi A New Method for Known Plaintext Attack of FEAL Cipher. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
27Toshinobu Kaneko A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
21Haibin Zhang, Hui Zhang A Security Enhancement Scheme for Image Perceptual Hashing. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multimedia content security, error correcting code, perceptual hashing, chosen-plaintext attack
21Heng-Sheng Chen, Tsang-Yean Lee, Huey-Ming Lee Collect and broadcast news in security. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cipher text, plaintext, algorithm, encryption, decryption
21G. N. Krishnamurthy, V. Ramaswamy, G. H. Leela, M. E. Ashalatha Performance Enhancement of CAST-128 Algorithm by modifying its function. Search on Bibsonomy SCSS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Plaintext, P-array, Cryptography, Encryption, Function, S-box, Decryption, Secret-key, Feistel-network, Ciphertext
18Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou 0001, Feng Bao 0001, Robert H. Deng Practical ID-based encryption for wireless sensor network. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF online/offline encryption, identity-based encryption, wireless sensor network security
18Yang Xiao 0001, Hsiao-Hwa Chen, Xiaojiang Du, Mohsen Guizani Stream-based cipher feedback mode in wireless error channel. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 831 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license