The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Cryptanalysis with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1982 (17) 1983-1985 (15) 1986-1988 (18) 1989-1990 (17) 1991 (19) 1992-1993 (37) 1994 (34) 1995 (18) 1996 (26) 1997 (34) 1998 (48) 1999 (43) 2000 (56) 2001 (80) 2002 (91) 2003 (108) 2004 (113) 2005 (172) 2006 (171) 2007 (181) 2008 (222) 2009 (206) 2010 (142) 2011 (177) 2012 (171) 2013 (152) 2014 (175) 2015 (209) 2016 (205) 2017 (168) 2018 (186) 2019 (188) 2020 (158) 2021 (174) 2022 (160) 2023 (183) 2024 (43)
Publication types (Num. hits)
article(2176) book(10) incollection(26) inproceedings(1893) phdthesis(112)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2108 occurrences of 562 keywords

Results
Found 4217 publication records. Showing 4217 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
36Enes Pasalic Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fast Algebraic attacks, Algebraic Attack Resistant, High Degree Product, Boolean function, Stream ciphers, Algebraic Immunity, Annihilators
36Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF nonlinear combination keystream generator, state transition matrix, Stream ciphers, LFSRs, algebraic attacks, fast correlation attack, decimation
36Janusz Biernat, Maciej Nikodem Fault Cryptanalysis of ElGamal Signature Scheme. Search on Bibsonomy EUROCAST The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Masayuki Kanda, Tsutomu Matsumoto Security of Camellia against Truncated Differential Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
36Steve Babbage, Laurent Frisch On MISTY1 Higher Order Differential Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
36Mehmet Emin Dalkiliç, Cengiz Gungor An Interactive Cryptanalysis Algorithm for the Vigenere Cipher. Search on Bibsonomy ADVIS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
36Shiho Moriai, Makoto Sugita, Kazumaro Aoki, Masayuki Kanda Security of E2 against Truncated Differential Cryptanalysis. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
36Ali Aydin Selçuk New Results in Linear Cryptanalysis of RC5. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
36Kouichi Sakurai, Souichi Furuya Improving Linear Cryptanalysis of LOKI91 by Probabilistic Counting Method. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
36Florent Chabaud, Serge Vaudenay Links Between Differential and Linear Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
36Ishai Ben-Aroya, Eli Biham Differential Cryptanalysis of Lucifer. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
36Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
34Hiroshi Kudou, Shunn-ichiro Nakayama, Atsushi Watanabe, Tomoyuki Nagase, Yoshio Yoshioka A Reconfigurable-Permutation Algorithm for M_S-Box. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Baudoin Collard, François-Xavier Standaert A Statistical Saturation Attack against the Block Cipher PRESENT. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
34Thomas Baignères, Matthieu Finiasz KFC - The Krazy Feistel Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
34Joan Daemen, Vincent Rijmen AES and the Wide Trail Design Strategy. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
34Marc Joye, Jean-Jacques Quisquater, Moti Yung On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
34Mitsuru Matsui On Correlation Between the Order of S-boxes and the Strength of DES. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
33Eli Biham, Alex Biryukov, Adi Shamir Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Skipjack, Yoyo game, Adaptive attacks, Cryptanalysis, Differential cryptanalysis, Impossible differentials
30Haijian Zhou, Ping Luo, Daoshun Wang, Yiqi Dai Probability method for cryptanalysis of general multivariate modular linear equation. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multivariate modular linear equation, cryptanalysis, public key cryptosystems, lattice basis reduction
30Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel A New Approach to chi2 Cryptanalysis of Block Ciphers. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ? 2, square and linear cryptanalysis, Block ciphers
30Thomas Fuhr 0001, Thomas Peyrin Cryptanalysis of RadioGatún. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RadioGatún, cryptanalysis, hash functions
30Baodong Qin, Ming Li, Fanyu Kong Cryptanalysis of a Type of CRT-Based RSA Algorithms. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF BOS scheme, cryptanalysis, RSA, Chinese remainder theorem, fault attack, LLL
30Karel P. Bergmann, Renate Scheidler, Christian Jacob 0001 Cryptanalysis using genetic algorithms. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, genetic algorithms, cryptanalysis
30Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo Impossible Differential Cryptanalysis of CLEFIA. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF diffusion switching mechanism, generalized Feistel structure, block cipher, impossible differential cryptanalysis, CLEFIA
30Dima Ruinskiy, Adi Shamir, Boaz Tsaban Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Thompson’s group, Shpilrain-Ushakov, Subgroup distance function, Cryptanalysis, Key agreement
30Wentao Zhang, Wenling Wu, Dengguo Feng New Results on Impossible Differential Cryptanalysis of Reduced AES. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, AES, impossible differentials
30Slobodan Petrovic, Amparo Fúster-Sabater Reconstruction of Suboptimal Paths in the Constrained Edit Distance Array with Application in Cryptanalysis. Search on Bibsonomy ICCSA (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Constrained Edit distance, Dynamic Programming, Cryptanalysis, Directed Search, String Editing
30Raphael C.-W. Phan, Bok-Min Goi Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF n-party, cryptanalysis, dictionary attack, collusion, Password-authenticated key exchange, key privacy
30Sébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF discrete logarithm, proof of knowledge, Public key cryptanalysis
30Sung-Ming Yen, Dongryeol Kim, Sang-Jae Moon Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Factorization attack, Fault infective CRT, Cryptography, Chinese remainder theorem (CRT), Residue number system, Hardware fault cryptanalysis
30Raphael C.-W. Phan, Bok-Min Goi Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF client-to-client, cryptanalysis, provable security, security model, Password-authenticated key exchange, cross realm
30Jean-Charles Faugère, Ludovic Perret Cryptanalysis of 2R- Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Functional Decomposition Problem (FDP), Gröbner bases, Cryptanalysis, F5 algorithm
30Yunyi Liu, Tuanfa Qin, Wansun Ni, Shuyi Zhang Cryptanalysis of the Energy Efficient Stream Ciphers SSC2. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF improved Guess-and-Determine attack, fast stream cipher, SSC2, wireless sensor networks, Cryptanalysis
30Raphael Chung-Wei Phan, Bok-Min Goi Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF client-to-client, unknown key-share, cryptanalysis, replay attack, Password-authenticated key exchange
30Nicolas T. Courtois Cryptanalysis of Sfinks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF solving systems of multivariate equations, fast algebraic attacks on stream ciphers, Boolean functions, stream ciphers, nonlinear filters, algebraic cryptanalysis
30Bok-Min Goi, Raphael Chung-Wei Phan, M. U. Siddiqi Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Buyer-Seller Watermarking Protocol, Cryptanalysis, Digital Watermarking, Copyright Protection
30Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi Cryptanalysis of PASS II and MiniPass. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF partial polynomial evaluation, cryptanalysis, digital signature scheme, NTRU, Authentication scheme
30Shuhong Wang 0001, Feng Bao 0001, Robert H. Deng Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptanalysis, Provable security, Forward security, Blind signature, Strong RSA assumption
30Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Feng Bao 0001 Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Two-lock cryptosystem, Cryptanalysis, Knapsack problem
30Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Verifiably Committed Signatures, Optimistic Fair Exchange, GPS Signature, Cryptanalysis
30Jorge Nakahara Jr., Daniel Santana de Freitas Cryptanalysis of Ake98. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Akelarre, Ake98, RC5, cryptanalysis, AES, IDEA, RC6
30Alex Biryukov, Joseph Lano, Bart Preneel Cryptanalysis of the Alleged SecurID Hash Function. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Alleged SecurID Hash Function, Internal Collision, Vanishing Differential, Differential Cryptanalysis
30Håvard Raddum Cryptanalysis of IDEA-X/2. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cryptography, block ciphers, differential cryptanalysis, IDEA
30Steve Babbage, Christophe De Cannière, Joseph Lano, Bart Preneel, Joos Vandewalle Cryptanalysis of SOBER-t32. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Sober-t32, Guess and Determine Attack, Cryptanalysis, Distinguishing Attack, Security Evaluation, NESSIE
30Eonkyung Lee, Je Hong Park Cryptanalysis of the Public-Key Encryption Based on Braid Groups. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Burau representation, Cryptanalysis, Public-key encryption, Braid group
30Ulrich Kühn 0001 Improved Cryptanalysis of MISTY1. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Slicing Attack, Cryptanalysis, Block cipher, Impossible Differential
30Tri Van Le, Yvo Desmedt Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection. Search on Bibsonomy Information Hiding The full citation details ... 2002 DBLP  DOI  BibTeX  RDF watermark analysis, cryptanalysis, watermarking
30Don Coppersmith, Shai Halevi, Charanjit S. Jutla Cryptanalysis of Stream Ciphers with Linear Masking. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Linear masking, Low-Diffusion attacks, Stream ciphers, Hypothesis testing, Linear cryptanalysis
30Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF NSS, Transcript Analysis, Cyclotomic Integer, Cryptanalysis, Lattice, Signature Scheme, Key Recovery, NTRU, Forgery
30Amr M. Youssef, Guang Gong Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Imai and Matsumoto asymmetric cryptosystems, cryptanalysis, Public-key cryptosystems
30Amr M. Youssef Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF augmented parity circuits, cryptanalysis, Block cipher
30Eli Biham Cryptanalysis of Triple Modes of Operation. Search on Bibsonomy J. Cryptol. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Triple modes of operation, Cryptanalysis, DES, Multiple encryption, Blockciphers
30Marc Joye, Seungjoo Kim, Narn-Yih Lee Cryptanalysis of Two Group Signature Schemes. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Universal forgeries, Cryptanalysis, Digital signatures, Group signatures
30Lars R. Knudsen, Willi Meier Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Perceptron Problem, Simulated Annealing, Cryptanalysis, Identification Scheme
30Eli Biham, Lars R. Knudsen Cryptanalysis of the ANSI X9.52 CBCM Mode. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF ANSI X9.52, C13CM mode, Cryptanalysis, Modes of operation, Multiple Encryption, Triple-DES
30Alex Biryukov, Eyal Kushilevitz From Differential Cryptanalysis to Ciphertext-Only Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Madryga, RC5, ciphertext-only attack, differential-linear attack, block-ciphers, DES, differential cryptanalysis
30David A. Wagner 0001, Bruce Schneier, John Kelsey Cryptanalysis of the Cellular Encryption Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF cellular telephone, Cryptanalysis, block ciphers
30Andrew Klapper, Mark Goresky Cryptanalysis Based on 2-Adic Rational Approximation. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF cryptanalysis, Binary sequences, rational approximation, feedback with carry shift registers, 2-adic numbers
28Tanmoy Kanti Das, Subhamoy Maitra Analysis of the "Wavelet Tree Quantization" watermarking strategy and a modified robust scheme. Search on Bibsonomy Multim. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Wavelet transform, Information security, Digital watermarking, Multimedia systems
28Vivien Dubois, Louis Granboulan, Jacques Stern An Efficient Provable Distinguisher for HFE. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF differential cryptanalysis, Multivariate cryptography, HFE
28Louis Granboulan, Éric Levieil, Gilles Piret Pseudorandom Permutation Families over Abelian Groups. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF arbitrary domain, differential and linear cryptanalysis, block cipher
28Florian Mendel, Norbert Pramstaller, Christian Rechberger Improved Collision Attack on the Hash Function Proposed at PKC'98. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, collision, collision attack, differential attack, near-collision
28Dag Arne Osvik, Adi Shamir, Eran Tromer Cache Attacks and Countermeasures: The Case of AES. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache, cryptanalysis, AES, side-channel attack, memory access
28Amir Moradi 0001, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh A Generalized Method of Differential Fault Attack Against AES Cryptosystem. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Smart Card, AES, Side Channel Attacks, Fault Attacks
28Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar Templates vs. Stochastic Methods. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF High-Order Attacks, Performance Analysis, Stochastic Model, Power Analysis, Side Channel Cryptanalysis, Template Attack
28Jorge Nakahara Jr., Daniel Santana de Freitas, Raphael Chung-Wei Phan New Multiset Attacks on Rijndael with Large Blocks. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF higher-order multiset attacks, cryptanalysis, Rijndael
28Marco Macchetti, Mario Caironi, Luca Breveglieri, Alessandra Cherubini A Complete Formulation of Generalized Affine Equivalence. Search on Bibsonomy ICTCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF generalized linear equivalence, Boolean functions, S-boxes, linear cryptanalysis
28Tanmoy Kanti Das, Hyoung Joong Kim, Subhamoy Maitra Security Evaluation of Generalized Patchwork Algorithm from Cryptanalytic Viewpoint. Search on Bibsonomy KES (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cryptanalysis, Information Security, Discrete Cosine Transform, Digital Watermarking, Multimedia Systems
28Heiko Stamer Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF completion attack, Knuth-Bendix completion, Cryptanalysis, weak keys, Church-Rosser property, string-rewriting systems
28Dai Watanabe, Soichi Furuya A MAC Forgery Attack on SOBER-128. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SOBER, Stream cipher, Differential cryptanalysis, Message Authentication Code
28Jovan Dj. Golic A Weakness of the Linear Part of Stream Cipher MUGI. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF combiners with memory, Stream ciphers, linear cryptanalysis, linear finite-state machines
28Slobodan Petrovic, Amparo Fúster-Sabater Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Irregular clocking, Cryptanalysis, Edit distance, Correlation attack, Directed search
28Beomsik Song, Jennifer Seberry Consistent Differential Patterns of Rijndael. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Consistent Differential Patterns, Differential Characteristics, Cryptanalysis, Rijndael
28Raphael Chung-Wei Phan, Soichi Furuya Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF extended slide attacks, sliding property, cryptanalysis, Block ciphers, DES, key schedule
28Pascal Junod On the Complexity of Matsui's Attack. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF DES, linear cryptanalysis
28Liam Keliher, Henk Meijer, Stafford E. Tavares New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF substitution-permutation networks, maximum average linear hull probability, provable security, linear cryptanalysis
28Siguna Müller, Winfried B. Müller The Security of Public Key Cryptosystems Based on Integer Factorization. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem
28Paul Camion, Anne Canteaut Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Correlation-immune functions, cryptanalysis, stream ciphers, hash functions, orthogonal arrays
28Paul C. van Oorschot, Michael J. Wiener Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF parallel collision search, low Hamming weight exponents, cryptanalysis, DES, Meet-in-the-middle attack
28Gilles Piret, François-Xavier Standaert Provable security of block ciphers against linear cryptanalysis: a mission impossible? Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A60
28Eric Brier, Thomas Peyrin Cryptanalysis of CubeHash. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CubeHash, hash functions, collision
28Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF linear hulls, algebraic analysis, systems of sparse polynomial equations of low degree, RFID, block ciphers
28Tim Güneysu, Timo Kasper, Martin Novotný, Christof Paar, Andy Rupp Cryptanalysis with COPACOBANA. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Juan M. Estévez-Tapiador, John A. Clark, Julio César Hernández Castro Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28S. Murphy The Independence of Linear Approximations in Symmetric Cryptanalysis. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Jesús Adolfo García-Pasquel, José Galaviz Ganzúa: A cryptanalysis tool for monoalphabetic and polyalphabetic ciphers. Search on Bibsonomy ACM J. Educ. Resour. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF classical cryptography, Cryptology
28Pierre-Alain Fouque, Louis Granboulan, Jacques Stern Differential Cryptanalysis for Multivariate Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Jean-Sébastien Coron Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Jean-Sébastien Coron, David Naccache Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fiat-Shamir Identification Protocol, Zero-knowledge
28Nicolas T. Courtois Feistel Schemes and Bi-linear Cryptanalysis. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Eli Biham, Orr Dunkelman, Nathan Keller Differential-Linear Cryptanalysis of Serpent. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Tanmoy Kanti Das Cryptanalysis of Block Based Spatial Domain Watermarking Schemes. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Carlos Javier Hernández-Castro, L. Javier García-Villalba, Julio César Hernández Castro, José María Sierra On MARS's s-boxes Strength against Linear Cryptanalysis. Search on Bibsonomy ICCSA (3) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Jean-Charles Faugère, Antoine Joux Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Elad Barkan, Eli Biham, Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri, Hiroshi Miyauchi Cryptanalysis of DES Implemented on Computers with Cache. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28François Koeune, Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Pierre David, Jean-Didier Legat An FPGA Implementation of the Linear Cryptanalysis. Search on Bibsonomy FPL The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee 0002, Jongin Lim 0001 Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 4217 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license