The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase key-recovery (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-1998 (19) 1999-2000 (20) 2001-2002 (22) 2003-2004 (25) 2005-2006 (29) 2007 (26) 2008 (33) 2009 (45) 2010-2011 (21) 2012-2013 (25) 2014 (20) 2015 (34) 2016 (38) 2017 (16) 2018 (19) 2019 (20) 2020 (22) 2021 (31) 2022 (42) 2023 (50) 2024 (17)
Publication types (Num. hits)
article(261) incollection(2) inproceedings(310) phdthesis(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 343 occurrences of 160 keywords

Results
Found 574 publication records. Showing 574 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
87Hartmut Pohl, Dietrich Cerny Enterprise Key Recovery: Vertrauenswürdige Server mit skalierbarer Sicherheit zur Archivierung von Konzelationsschlüsseln. Search on Bibsonomy Inform. Spektrum The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Sicherheitsarchitektur, Sicherheitsniveau, Skalierbarkeit, Unternehmen, Verschlüsselung, Electronic commerce, Key recovery, Sicherheit
69Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew J. Clark, Ed Dawson Key recovery for the commercial environment. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Commercial key recovery, Software key recovery, Key management, Key escrow
60Kanokwan Kanyamee, Chanboon Sathitwiriyawong High-Availability Decentralized Multi-Agent Key Recovery System. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
56Dae-Hee Seo, Im-Yeong Lee, Hee-Un Park A Study on Key Recovery Agent Protection Profile Having Composition Function. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Key Recovery Protection Profile, Evaluation Methodology, Common Criteria
53Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path
51Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle The Design and Implementation of Protocol-Based Hidden Key Recovery. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
51Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision
46Yahya Y. Al-Salqan Cryptographic Key Recovery. Search on Bibsonomy FTDCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
45Konstantinos Rantos, Chris J. Mitchell Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF interoperability, Key recovery, negotiation protocol
43Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key-dependent S-box, Mir-1, stream cipher, eSTREAM, key recovery attack
43Sung-Ming Yen Practical Key Recovery Schemes. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee New WAKE Key Recovery Protocol on M-commerce. Search on Bibsonomy ICWE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Authentication, M-Commerce, Key Establishment, Key Recovery
42Yung-Cheng Lee, Chi-Sung Laih On the Key Recovery of the Key Escrow System. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Key Escrow System, social needs, criminal behavior, public cryptographic functions, encryption standard, cryptography, public key cryptography, protection, key recovery, user privacy
41Yoon-Jung Rhee, Tai-Yun Kim Practical Solutions to Key Recovery Based on PKI in IP Security. Search on Bibsonomy SAFECOMP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
40Jaechul Sung, Deukjo Hong, Sangjin Lee 0002 Key Recovery Attacks on the RMAC, TMAC, and IACBC. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RMAC, TMAC, XCBC, IACBC, Message Authentication Codes, Modes of Operation, Key Recovery Attacks, CBC-MAC
39Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HMAC, Key recovery attack, Second preimage attack, NMAC, HAVAL
39Debra L. Cook, Moti Yung, Angelos D. Keromytis The Security of Elastic Block Ciphers Against Key-Recovery Attacks. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Variable-length block ciphers, reduction proof, security analysis, key recovery attacks
39Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MAC (Message Authentication Code), PMAC, TMAC Variant, Key Recovery Attacks, CBC-MAC, Forgery Attacks
39Adam L. Young, Moti Yung A Space Efficient Backdoor in RSA and Its Applications. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP
37Riddhipratim Basu, Subhamoy Maitra, Goutam Paul 0001, Tanmoy Talukdar On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling. Search on Bibsonomy AAECC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream Cipher, Filter, Permutation, Sequence, Bias, RC4, Key Recovery
37Leonie Ruth Simpson, Matthew Henricksen Improved Cryptanalysis of MAG. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Disting- uisher, MAG Keystream Generator, Cryptography, Stream Ciphers, Key Recovery
36Yanjiang Yang, Feng Bao 0001, Robert H. Deng Security Analysis and Improvement of the Global Key Recovery System. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
35Adam L. Young, Moti Yung A Key Recovery System as Secure as Factoring. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Rabin, Blum integer, pseudosquare, PKCS #1, standard compatibility, RSA, public key cryptography, zero-knowledge, chosen ciphertext security, key recovery, semantic Security, quadratic residue
31Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn Modeling of Multiple Agent based Cryptographic Key Recovery Protocol. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30Chong Hee Kim, Pil Joong Lee New Key Recovery in WAKE Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Serge Vaudenay, Martin Vuagnoux Passive-Only Key Recovery Attacks on RC4. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key related attack, cryptanalysis, stream cipher, RC4, WEP
28Helena Handschuh, Bart Preneel Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Gaoli Wang, Shaohui Wang Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key-recovery, HMAC, second preimage attack, NMAC, HAVAL
28Gerhard Weck Key Recovery - Möglichkeiten und Risiken. Search on Bibsonomy Inform. Spektrum The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Verschlüsselung, Trust Center, digitale Signaturen, Key Recovery
27Atsuko Miyaji, Yuuki Takano On the Success Probability of chi2-attack on RC6. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague GBD Threshold Cryptography with an Application to RSA Key Recovery. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang A Secure Re-keying Scheme with Key Recovery Property. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Chae Hoon Lim, Pil Joong Lee A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
26Barbara C. Davis, Tatu Ylönen Working Group Report on Internet/Intranet Security. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF intranet security, key backup, security implementation costs, security functionality, fault tolerance, Internet, enterprises, secure communications, Internet security, data protection, information infrastructure, key recovery, key escrow, law enforcement, redundant paths, data value
25Itsik Mantin A Practical Attack on the Fixed RC4 in the WEP Mode. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks
25Simon Fischer 0002, Shahram Khazaei, Willi Meier Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Chosen IV analysis, Stream ciphers, eSTREAM, Trivium, Grain
24Shahram Khazaei, Willi Meier On Reconstruction of RC4 Keys from Internal States. Search on Bibsonomy MMICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Binary Hypothesis Testing, Stream Ciphers, RC4, Key Recovery
24Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF NSS, Transcript Analysis, Cyclotomic Integer, Cryptanalysis, Lattice, Signature Scheme, Key Recovery, NTRU, Forgery
24Eric R. Verheul, Henk C. A. van Tilborg Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. Search on Bibsonomy EUROCRYPT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Traceable ElGamal, Key Recovery, Key Escrow, ElGamal
24Sarbari Gupta A Common Key Recovery Block Format: Promoting Interoperability Between Dissimilar Key Recovery Mechanisms. Search on Bibsonomy Comput. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
23Lars R. Knudsen, Chris J. Mitchell Partial Key Recovery Attack Against RMAC. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RMAC, AES, Message Authentication Codes, Triple DES
23Tomoki Uemura, Yohei Watanabe 0001, Yang Li 0001, Noriyuki Miura, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule. Search on Bibsonomy ISITA The full citation details ... 2020 DBLP  BibTeX  RDF
23Debra L. Cook, Moti Yung, Angelos D. Keromytis Elastic block ciphers: method, security and instantiations. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Elastic block ciphers, Variable-length block ciphers, Reduction proof, Security analysis, Key recovery attacks
23Xiaoyun Wang 0001, Hongbo Yu, Wei Wang 0035, Haina Zhang, Tao Zhan Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MDx-MAC, Distinguishing attack, MD5, Key recovery, HMAC, NMAC
23María Naya-Plasencia Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack
22Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano Success Probability in Chi2-Attacks. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF RC5-64, 2 attack, statistical analysis, RC6
21María Naya-Plasencia Cryptanalysis of Achterbahn-128/80. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack
21Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar ELK, A New Protocol for Efficient Large-Group Key Distribution. Search on Bibsonomy S&P The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
21Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
21Hans Georg Schaathun A key-recovery attack on authentication watermarking by li and yuan. Search on Bibsonomy MM&Sec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF watermarking, image authentication, mac
21Birgit Pfitzmann, Michael Waidner How to Break Fraud-Detectable Key Recovery. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Eli Biham, Orr Dunkelman, Nathan Keller A Simple Related-Key Attack on the Full SHACAL-1. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Christophe Petit 0001, François-Xavier Standaert, Olivier Pereira, Tal Malkin, Moti Yung A block cipher based pseudo random number generator secure against side-channel key recovery. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Pierre-Alain Fouque, Gilles Macario-Rat, Jacques Stern Key Recovery on Hidden Monomial Multivariate Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Eric Ke Wang, Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Zoe Lin Jiang, Siu-Ming Yiu A Key-Recovery System for Long-term Encrypted Documents. Search on Bibsonomy EDOC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Adam Stubblefield, John Ioannidis, Aviel D. Rubin A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF wired equivalent privacy, Wireless security
19Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Cryptanalysis, Message Authentication Codes, CBC-MAC
19Paolo D'Arco, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants. Search on Bibsonomy MFCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery and Key Recovery Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
18François-Xavier Standaert, Tal Malkin, Moti Yung A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Martin Hell, Thomas Johansson 0001 A Key Recovery Attack on Edon80. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Scott Contini, Yiqun Lisa Yin Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Chris J. Mitchell Partial Key Recovery Attacks on XCBC, TMAC and OMAC. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Caicai Chen, Chris Jones Key-Recovery Attack on a Public-Key Encryption Related to Planted Clique. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
17Puja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, Ingrid Verbauwhede A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer. Search on Bibsonomy ACNS (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Puja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, Ingrid Verbauwhede A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Puja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, Ingrid Verbauwhede A practical key-recovery attack on LWE-based key- encapsulation mechanism schemes using Rowhammer. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
17Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection. Search on Bibsonomy ACISP The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang 0001, Keting Jia, Yunwen Liu Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
17Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang 0001, Keting Jia, Yunwen Liu Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
17Takanori Isobe 0001, Kyoji Shibutani Key-Recovery Security of Single-Key Even-Mansour Ciphers. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
17Rongjia Li, Chenhui Jin, Hongchen Pan Key recovery attacks on reduced-round Joltik-BC in the single-key setting. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Hua Wang, Yongli Zhao, Xiaosong Yu, Avishek Nag, Zhangchao Ma, Jianquan Wang, Longchuan Yan, Jie Zhang 0006 Resilient Quantum Key Distribution (QKD)-Integrated Optical Networks With Secret-Key Recovery Strategy. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Takanori Isobe 0001, Kyoji Shibutani Meet-in-the-Middle Key Recovery Attacks on a Single-Key Two-Round Even-Mansour Cipher. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
17Meicheng Liu, Jingchun Yang, Wenhao Wang 0001, Dongdai Lin Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
17Meicheng Liu, Jingchun Yang, Wenhao Wang 0001, Dongdai Lin Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery. Search on Bibsonomy EUROCRYPT (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
17Yasufumi Hashimoto Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
17Houzhen Wang, Huanguo Zhang, Shaohua Tang Key recovery on several matrix public-key encryption schemes. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Mengting Chen, Yang Li 0022, Jian Wang 0038 Another SPA Key Recovery Against Random Order Countermeasures for AES Key Expansion. Search on Bibsonomy ICCCS (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
17Yu Sasaki, Gaoli Wang, Lei Wang 0031 Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Pierre Karpman From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
17Ahmed Abdelkhalek 0001, Mohamed Tolba, Amr M. Youssef Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting. Search on Bibsonomy SPACE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Pierre Karpman From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour. Search on Bibsonomy ISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Tomoyuki Tanigaki, Noboru Kunihiro Maximum Likelihood-Based Key Recovery Algorithm from Decayed Key Schedules. Search on Bibsonomy ICISC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
17Nicolas T. Courtois, Pinar Emirdag, Filippo Valsorda Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
17Yu Sasaki, Lei Wang 0031 Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting. Search on Bibsonomy EUROCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
17Jiageng Chen, Atsuko Miyaji Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
17Chunfei Ju, Hui Yuan Key Recovery Attack on a Knapsack Public Key Cryptosystem. Search on Bibsonomy INCoS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
17Abdel Alim Kamal, Amr M. Youssef Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
17Abdel Alim Kamal, Amr M. Youssef Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule Images. Search on Bibsonomy SECURWARE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Jiageng Chen, Atsuko Miyaji A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model. Search on Bibsonomy Inscrypt The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
17Taenam Cho, Sang-Ho Lee 0004, Won Kim 0001 A group key recovery mechanism based on logical key hierarchy. Search on Bibsonomy J. Comput. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Taenam Cho, Sang-Ho Lee A Key Recovery Mechanism for Reliable Group Key Management. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Sarbari Gupta, Stephen M. Matyas Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery. Search on Bibsonomy Comput. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier The risks of key recovery, key escrow, and trusted third-party encryption. Search on Bibsonomy World Wide Web J. The full citation details ... 1997 DBLP  BibTeX  RDF
17Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar Correlated Keystreams in Moustique. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Moustique, related keys, eSTREAM
17Yu Sasaki Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DMMD, collision, HMAC, second preimage, AURORA
16Phong Q. Nguyen, Oded Regev 0001 Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF GGH, NTRUSign, Lattices, Moment, Gradient descent, Public-key cryptanalysis
Displaying result #1 - #100 of 574 (100 per page; Change: )
Pages: [1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license