The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase known-plaintext (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1977-1991 (15) 1992-1998 (18) 1999-2003 (21) 2004-2005 (21) 2006-2007 (23) 2008-2011 (15) 2012-2019 (15) 2020-2023 (10)
Publication types (Num. hits)
article(38) incollection(2) inproceedings(98)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 124 occurrences of 79 keywords

Results
Found 138 publication records. Showing 138 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
95Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IDEA and MESH ciphers, known-plaintext attack, Cryptanalysis
90Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng An Efficient Known Plaintext Attack on FEA-M. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
89Michael Stay ZIP Attacks with Reduced Known Plaintext. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
89Anne Tardy-Corfdir, Henri Gilbert A Known Plaintext Attack of FEAL-4 and FEAL-6. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
80Paul C. van Oorschot, Michael J. Wiener A Known Plaintext Attack on Two-Key Triple Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF Triple encryption, cryptanalysis, DES
69Ivan Damgård, Jesper Buus Nielsen Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
63Eun-Jun Yoon, Kee-Young Yoo An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority. Search on Bibsonomy SOFSEM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Self-certified public key, Known plaintext-ciphertext attack, Cryptography, Digital signature, Message recovery
62Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF FPGA, Cryptography, DES, linear cryptanalysis, efficient implementations
62Dominik Engel, Rade Kutil, Andreas Uhl A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ciphertext-only, known-plaintext, secret frequency domain, secret parameterized wavelet filters, attack, JPEG2000
62Tzonelih Hwang, T. R. N. Rao Secret Error-Correcting Codes (SECC). Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity
54Joydip Mitra A Near-Practical Attack Against B Mode of HBB. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF known-plaintext attack, HBB, cryptanalysis, stream cipher
53Jun Song 0003, Huanguo Zhang, Qingshu Meng, Zhang-yi Wang Cryptanalysis of Two-Round DES Using Genetic Algorithms. Search on Bibsonomy ISICA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF two-round DES, known plaintext attack, genetic algorithm, cryptanalysis, fitness function
51Atsuko Miyaji, Masao Nonaka, Yoshinori Takii Known Plaintext Correlation Attack against RC5. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
50Kazuhiko Minematsu, Yukiyasu Tsunoo Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Jacques Patarin Security of Random Feistel Schemes with 5 or More Rounds. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
48Herbert S. Bright Cryptanalytic Attack and Defense: Ciphertext-Only, Known-Plaintext, Chosen-Plaintext. Search on Bibsonomy Cryptologia The full citation details ... 1977 DBLP  DOI  BibTeX  RDF
47Jacques Patarin Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
47Thomas Jakobson Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF interpolation attack, non-linear relations, Sudan's algorithm, Cryptanalysis, block cipher, Reed-Solomon codes
44Mitsuru Matsui, Atsuhiro Yamagishi A New Method for Known Plaintext Attack of FEAL Cipher. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
42Soichi Furuya Slide Attacks with a Known-Plaintext Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
40Toshinobu Kaneko A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
32Pascal Junod New Attacks Against Reduced-Round Versions of IDEA. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Demirci-Biryukov relation, Block ciphers, IDEA
32Wenbo Mao, Colin Boyd On Strengthening Authentication Protocols to Foil Cryptanalysis. Search on Bibsonomy ESORICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
30Baudoin Collard, François-Xavier Standaert A Statistical Saturation Attack against the Block Cipher PRESENT. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
30Ivan Damgård, Thomas Pedersen, Louis Salvail On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Adam L. Young, Moti Yung Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography
30Johan Borst, Bart Preneel, Joos Vandewalle Linear Cryptanalysis of RC5 and RC6. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
30Alex Biryukov, Eyal Kushilevitz From Differential Cryptanalysis to Ciphertext-Only Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Madryga, RC5, ciphertext-only attack, differential-linear attack, block-ciphers, DES, differential cryptanalysis
30Daniel Espinoza Figueroa Compromising sensitive information through Padding Oracle and Known Plaintext attacks in Encrypt-then-TLS scenarios. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
30Subrata Nandi, Srinivasan Krishnaswamy, Behrouz Zolfaghari, Pinaki Mitra Key-Dependent Feedback Configuration Matrix of Primitive σ-LFSR and Resistance to Some Known Plaintext Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Fusen Wang, Jun Sang, Chunlin Huang, Bin Cai, Hong Xiang, Nong Sang Applying Deep Learning to Known-Plaintext Attack on Chaotic Image Encryption Schemes. Search on Bibsonomy ICASSP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Nino Fürthauer, Vasily Mikhalev, Nils Kopal, Bernhard Esslinger, Harald Lampesberger, Eckehard Hermann Evaluating Deep Learning Techniques for Known-Plaintext Attacks on the Complete Columnar Transposition Cipher. Search on Bibsonomy HistoCrypt The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Seongbong Choi, Hyung Tae Lee Known Plaintext Attacks on the Omar and abed Homomorphic Encryption Scheme. Search on Bibsonomy ICTC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
30Sherif Abdelfattah, Mohamed Baza, Mahmoud M. Badr, Mohamed M. E. A. Mahmoud, Gautam Srivastava 0001, Fawaz Alsolami 0001, Abdullah Marish Ali Efficient Search Over Encrypted Medical Data With Known-Plaintext/Background Models and Unlinkability. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
30Takehisa Iwakoshi Security Evaluation of Y00 Protocol Based on Time-Translational Symmetry Under Quantum Collective Known-Plaintext Attacks. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
30Fusen Wang, Jun Sang, Qi Liu, Chunlin Huang, Jinghan Tan A deep learning based known plaintext attack method for chaotic cryptosystem. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
30Yanjun Pan, Yao Zheng, Ming Li 0003 ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
30Yanjun Pan, Yao Zheng, Ming Li 0003 ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization. Search on Bibsonomy INFOCOM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
30Shuming Jiao, Ting Lei, Yang Gao, Zhenwei Xie, Xiaocong Yuan Known-Plaintext Attack and Ciphertext-Only Attack for Encrypted Single-Pixel Imaging. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
30Shuming Jiao, Yang Gao, Ting Lei, Zhenwei Xie, Xiaocong Yuan Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
30Leo Yu Zhang, Yuansheng Liu, Cong Wang 0001, Jiantao Zhou 0001, Yushu Zhang, Guanrong Chen Improved known-plaintext attack to permutation-only multimedia ciphers. Search on Bibsonomy Inf. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
30Junjun Gan, Jiu-fen Liu, Xiangyang Luo, Chunfang Yang, Fenlin Liu Reliable steganalysis of HUGO steganography based on partially known plaintext. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
30Takehisa Iwakoshi Guessing probability under unlimited known-plaintext attack on secret keys for Y00 quantum stream cipher by quantum multiple hypotheses testing. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
30Mauro Mangia, Fabio Pareschi, Riccardo Rovatti, Gianluca Setti Low-Cost Security of IoT Sensor Nodes With Rakeness-Based Compressed Sensing: Statistical and Known-Plaintext Attacks. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
30George Lasry, Nils Kopal, Arno Wacker Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages. Search on Bibsonomy Cryptologia The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Matthias Schulz 0001, Adrian Loch, Matthias Hollick DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems. Search on Bibsonomy WISEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
30Yao Zheng, Matthias Schulz 0001, Wenjing Lou, Yiwei Thomas Hou, Matthias Hollick Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security. Search on Bibsonomy IEEE Wirel. Commun. Lett. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Valerio Cambareri, Mauro Mangia, Fabio Pareschi, Riccardo Rovatti, Gianluca Setti On Known-Plaintext Attacks to a Compressed Sensing-Based Encryption: A Quantitative Analysis. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Ye Yuan, Yilin Mo Security in cyber-physical systems: Controller design against Known-Plaintext Attack. Search on Bibsonomy CDC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
30Chunsheng Gu, Jixing Gu Known-plaintext attack on secure kNN computation on encrypted databases. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
30Matthias Schulz 0001, Adrian Loch, Matthias Hollick Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems. Search on Bibsonomy NDSS The full citation details ... 2014 DBLP  BibTeX  RDF
30Valerio Cambareri, Mauro Mangia, Fabio Pareschi, Riccardo Rovatti, Gianluca Setti Low-complexity Multiclass Encryption by Compressed Sensing, Part II: Known-Plaintext Attacks. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
30Adi Shamir, Eldad Zinger A Practical Polynomial-Time Known-Plaintext Attack on a Cryptosystem Proposed by John Nash. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
30Alex Biryukov Known Plaintext Attack. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
30Rajaraman Vaidyanathaswami, Andrew Thangaraj Known plaintext attack on the binary symmetric wiretap channel. Search on Bibsonomy GLOBECOM Workshops The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
30Wafaa G. Abd-Elmonim, Neveen I. Ghali, Aboul Ella Hassanien, Ajith Abraham Known-plaintext attack of DES-16 using Particle Swarm Optimization. Search on Bibsonomy NaBIC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
30Kyung Chul Jeong, Dong Hoon Lee 0002, Daewan Han An Improved Known Plaintext Attack on PKZIP Encryption Algorithm. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
30Ee-Chien Chang, Chengfang Fang, Jia Xu 0006 A chameleon encryption scheme resistant to known-plaintext attack. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
30Martin Hlavác Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Montgomery exponentiation, electronic passport, RSA, side channel attack, Chinese Remainder Theorem, Hidden Number Problem
30Gonzalo Álvarez Marañón, Luis Hernández Encinas, Jaime Muñoz Masqué Known-Plaintext Attack to Two Cryptosystems Based on the BB Equation. Search on Bibsonomy IEEE Trans. Circuits Syst. II Express Briefs The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Ueli M. Maurer, Johan Sjödin A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Jung Hee Cheon, Woo-Hwan Kim, Hyun Soo Nam Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Ueli Maurer, Johan Sjödin A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
30H. D. Phaneendra, C. Vidya Raj, M. S. Shivakumar Applying Quantum Search to a Known-Plaintext Attack on Two-Key Triple Encryption. Search on Bibsonomy Intelligent Information Processing The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Quantum algorithm, exhaustive search, Quantum mechanics, qubits, Quantum search, 3DES
30Alex Biryukov Known plaintext attack. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Sahadeo Padhye Partial known plaintext attack on Koyama scheme. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
30Adam J. Slagell Known-Plaintext Attack Against a Permutation Based Video. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
30Marina Pudovkina A known plaintext attack on the ISAAC keystream generator. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2001 DBLP  BibTeX  RDF
30H. Paul Greenough Cryptanalysis of the Hagelin C-52 and Similar Machines a Known Plaintext Attack. Search on Bibsonomy Cryptologia The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
30H. Paul Greenough Cryptanalysis of the Swedish HC-9 a Known-Plaintext Approach. Search on Bibsonomy Cryptologia The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
30Eli Biham, Paul C. Kocher A Known Plaintext Attack on the PKZIP Stream Cipher. Search on Bibsonomy FSE The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
30Jack Levine, Richard Chandler The Hill Cryptographic System with Unknown Cipher Alphabet but Known Plaintext. Search on Bibsonomy Cryptologia The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
30Frank Rubin Foiling the Known-Plaintext Attack. Search on Bibsonomy Cryptologia The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
29Joana Treger, Jacques Patarin Generic Attacks on Feistel Networks with Internal Permutations. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unbalanced Feistel permutations, generic attacks, Luby-Rackoff theory, block ciphers, pseudo-random permutations
29Chae Hoon Lim, Pil Joong Lee Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
22Orhun Kara Reflection Cryptanalysis of Some Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Round Function, Round Key, Cryptanalysis, Block Cipher, Self-similarity, Related Key Attack, Slide Attack, Key Schedule, Reflection attack
22Chris J. Mitchell Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Alex Biryukov, David A. Wagner 0001 Advanced Slide Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
21Daniel Socek, Dubravko Culibrk On the security of a clipped hopfield neural network-based cryptosystem. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF neural networks, cryptography, randomness, permutations, data security
21Jaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee 0002, Jongin Lim 0001 Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
21Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege Analysis Methods for (Alleged) RC4. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
21Willi Meier, Othmar Staffelbach Analysis of Pseudo Random Sequence Generated by Cellular Automata. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
21Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman Is the Data Encryption Standard a Group? (Preliminary Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptanalysis, Data Encryption Standard (DES), multiple encryption, Birthday Paradox
20Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur Wirelessly Pickpocketing a Mifare Classic Card. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Farhad Maleki, Ali Mohades, S. Mehdi Hashemi, Mohammad E. Shiri An Image Encryption System by Cellular Automata with Memory. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF image security, Lossy method, Cryptography, Cellular automata, image encryption, CA
20Andrey Bogdanov Improved Side-Channel Collision Attacks on AES. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF generalized collisions, AES, side-channel attacks, random graphs, connected components, collision attacks
20Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Unbalanced Feistel permutations, generic attacks on encryption schemes, Block ciphers, pseudo-random permutations
20Jiantao Zhou 0001, Zhiqin Liang, Yan Chen 0007, Oscar C. Au On the Security of Multimedia Encryption Schemes Based on Multiple Huffman Table (MHT). Search on Bibsonomy ICME The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Kazuhiko Minematsu, Yukiyasu Tsunoo Expanding Weak PRF with Small Key Size. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20S. S. Bedi, N. Rajesh Pillai Cryptanalysis of the Nonlinear FeedForward Generator. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Eli Biham, Adi Shamir Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
20Shoji Miyaguchi The FEAL-8 Cryptosystem and a Call for Attack. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
16Martin Hell, Thomas Johansson 0001 Two New Attacks on the Self-Shrinking Generator. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Chris J. Mitchell Cryptanalysis of the EPBC Authenticated Encryption Mode. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Mitsuru Matsui Linear Cryptanalysis Method for DES Cipher. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
13Willi Meier, Othmar Staffelbach Correlation Properties of Combiners with Memory in Stream Ciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
12Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona Recovering DC Coefficients in Block-Based DCT. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Jorge Nakahara Jr., Daniel Santana de Freitas Cryptanalysis of Ake98. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Akelarre, Ake98, RC5, cryptanalysis, AES, IDEA, RC6
12Souradyuti Paul, Bart Preneel Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 138 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license