|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2108 occurrences of 562 keywords
|
|
|
Results
Found 4217 publication records. Showing 4217 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
36 | Enes Pasalic |
Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
Fast Algebraic attacks, Algebraic Attack Resistant, High Degree Product, Boolean function, Stream ciphers, Algebraic Immunity, Annihilators |
36 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
nonlinear combination keystream generator, state transition matrix, Stream ciphers, LFSRs, algebraic attacks, fast correlation attack, decimation |
36 | Janusz Biernat, Maciej Nikodem |
Fault Cryptanalysis of ElGamal Signature Scheme. |
EUROCAST |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Masayuki Kanda, Tsutomu Matsumoto |
Security of Camellia against Truncated Differential Cryptanalysis. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
36 | Steve Babbage, Laurent Frisch |
On MISTY1 Higher Order Differential Cryptanalysis. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
36 | Mehmet Emin Dalkiliç, Cengiz Gungor |
An Interactive Cryptanalysis Algorithm for the Vigenere Cipher. |
ADVIS |
2000 |
DBLP DOI BibTeX RDF |
|
36 | Shiho Moriai, Makoto Sugita, Kazumaro Aoki, Masayuki Kanda |
Security of E2 against Truncated Differential Cryptanalysis. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
36 | Ali Aydin Selçuk |
New Results in Linear Cryptanalysis of RC5. |
FSE |
1998 |
DBLP DOI BibTeX RDF |
|
36 | Kouichi Sakurai, Souichi Furuya |
Improving Linear Cryptanalysis of LOKI91 by Probabilistic Counting Method. |
FSE |
1997 |
DBLP DOI BibTeX RDF |
|
36 | Florent Chabaud, Serge Vaudenay |
Links Between Differential and Linear Cryptanalysis. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
36 | Ishai Ben-Aroya, Eli Biham |
Differential Cryptanalysis of Lucifer. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
36 | Lawrence Brown, Matthew Kwan, Josef Pieprzyk, Jennifer Seberry |
Improving Resistance to Differential Cryptanalysis and the Redesign of LOKI. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
34 | Hiroshi Kudou, Shunn-ichiro Nakayama, Atsushi Watanabe, Tomoyuki Nagase, Yoshio Yoshioka |
A Reconfigurable-Permutation Algorithm for M_S-Box. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Baudoin Collard, François-Xavier Standaert |
A Statistical Saturation Attack against the Block Cipher PRESENT. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
34 | Thomas Baignères, Matthieu Finiasz |
KFC - The Krazy Feistel Cipher. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
34 | Joan Daemen, Vincent Rijmen |
AES and the Wide Trail Design Strategy. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
34 | Marc Joye, Jean-Jacques Quisquater, Moti Yung |
On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC. |
CT-RSA |
2001 |
DBLP DOI BibTeX RDF |
|
34 | Mitsuru Matsui |
On Correlation Between the Order of S-boxes and the Strength of DES. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
33 | Eli Biham, Alex Biryukov, Adi Shamir |
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. |
J. Cryptol. |
2005 |
DBLP DOI BibTeX RDF |
Skipjack, Yoyo game, Adaptive attacks, Cryptanalysis, Differential cryptanalysis, Impossible differentials |
30 | Haijian Zhou, Ping Luo, Daoshun Wang, Yiqi Dai |
Probability method for cryptanalysis of general multivariate modular linear equation. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
multivariate modular linear equation, cryptanalysis, public key cryptosystems, lattice basis reduction |
30 | Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel |
A New Approach to chi2 Cryptanalysis of Block Ciphers. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
? 2, square and linear cryptanalysis, Block ciphers |
30 | Thomas Fuhr 0001, Thomas Peyrin |
Cryptanalysis of RadioGatún. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
RadioGatún, cryptanalysis, hash functions |
30 | Baodong Qin, Ming Li, Fanyu Kong |
Cryptanalysis of a Type of CRT-Based RSA Algorithms. |
J. Comput. Sci. Technol. |
2008 |
DBLP DOI BibTeX RDF |
BOS scheme, cryptanalysis, RSA, Chinese remainder theorem, fault attack, LLL |
30 | Karel P. Bergmann, Renate Scheidler, Christian Jacob 0001 |
Cryptanalysis using genetic algorithms. |
GECCO |
2008 |
DBLP DOI BibTeX RDF |
security, genetic algorithms, cryptanalysis |
30 | Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo |
Impossible Differential Cryptanalysis of CLEFIA. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
diffusion switching mechanism, generalized Feistel structure, block cipher, impossible differential cryptanalysis, CLEFIA |
30 | Dima Ruinskiy, Adi Shamir, Boaz Tsaban |
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Thompson’s group, Shpilrain-Ushakov, Subgroup distance function, Cryptanalysis, Key agreement |
30 | Wentao Zhang, Wenling Wu, Dengguo Feng |
New Results on Impossible Differential Cryptanalysis of Reduced AES. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, AES, impossible differentials |
30 | Slobodan Petrovic, Amparo Fúster-Sabater |
Reconstruction of Suboptimal Paths in the Constrained Edit Distance Array with Application in Cryptanalysis. |
ICCSA (3) |
2007 |
DBLP DOI BibTeX RDF |
Constrained Edit distance, Dynamic Programming, Cryptanalysis, Directed Search, String Editing |
30 | Raphael C.-W. Phan, Bok-Min Goi |
Cryptanalysis of the N-Party Encrypted Diffie-Hellman Key Exchange Using Different Passwords. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
n-party, cryptanalysis, dictionary attack, collusion, Password-authenticated key exchange, key privacy |
30 | Sébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern |
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
discrete logarithm, proof of knowledge, Public key cryptanalysis |
30 | Sung-Ming Yen, Dongryeol Kim, Sang-Jae Moon |
Cryptanalysis of Two Protocols for RSA with CRT Based on Fault Infection. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
Factorization attack, Fault infective CRT, Cryptography, Chinese remainder theorem (CRT), Residue number system, Hardware fault cryptanalysis |
30 | Raphael C.-W. Phan, Bok-Min Goi |
Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
client-to-client, cryptanalysis, provable security, security model, Password-authenticated key exchange, cross realm |
30 | Jean-Charles Faugère, Ludovic Perret |
Cryptanalysis of 2R- Schemes. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
Functional Decomposition Problem (FDP), Gröbner bases, Cryptanalysis, F5 algorithm |
30 | Yunyi Liu, Tuanfa Qin, Wansun Ni, Shuyi Zhang |
Cryptanalysis of the Energy Efficient Stream Ciphers SSC2. |
MADNES |
2005 |
DBLP DOI BibTeX RDF |
improved Guess-and-Determine attack, fast stream cipher, SSC2, wireless sensor networks, Cryptanalysis |
30 | Raphael Chung-Wei Phan, Bok-Min Goi |
Cryptanalysis of an Improved Client-to-Client Password-Authenticated Key Exchange (C2C-PAKE) Scheme. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
client-to-client, unknown key-share, cryptanalysis, replay attack, Password-authenticated key exchange |
30 | Nicolas T. Courtois |
Cryptanalysis of Sfinks. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
solving systems of multivariate equations, fast algebraic attacks on stream ciphers, Boolean functions, stream ciphers, nonlinear filters, algebraic cryptanalysis |
30 | Bok-Min Goi, Raphael Chung-Wei Phan, M. U. Siddiqi |
Cryptanalysis of a Generalized Anonymous Buyer-Seller Watermarking Protocol of IWDW 2004. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
Buyer-Seller Watermarking Protocol, Cryptanalysis, Digital Watermarking, Copyright Protection |
30 | Bok-Min Goi, Jintai Ding, Mohammad Umar Siddiqi |
Cryptanalysis of PASS II and MiniPass. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
partial polynomial evaluation, cryptanalysis, digital signature scheme, NTRU, Authentication scheme |
30 | Shuhong Wang 0001, Feng Bao 0001, Robert H. Deng |
Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable Security. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Provable security, Forward security, Blind signature, Strong RSA assumption |
30 | Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Feng Bao 0001 |
Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
Two-lock cryptosystem, Cryptanalysis, Knapsack problem |
30 | Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater |
Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
Verifiably Committed Signatures, Optimistic Fair Exchange, GPS Signature, Cryptanalysis |
30 | Jorge Nakahara Jr., Daniel Santana de Freitas |
Cryptanalysis of Ake98. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
Akelarre, Ake98, RC5, cryptanalysis, AES, IDEA, RC6 |
30 | Alex Biryukov, Joseph Lano, Bart Preneel |
Cryptanalysis of the Alleged SecurID Hash Function. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Alleged SecurID Hash Function, Internal Collision, Vanishing Differential, Differential Cryptanalysis |
30 | Håvard Raddum |
Cryptanalysis of IDEA-X/2. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
Cryptography, block ciphers, differential cryptanalysis, IDEA |
30 | Steve Babbage, Christophe De Cannière, Joseph Lano, Bart Preneel, Joos Vandewalle |
Cryptanalysis of SOBER-t32. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
Sober-t32, Guess and Determine Attack, Cryptanalysis, Distinguishing Attack, Security Evaluation, NESSIE |
30 | Eonkyung Lee, Je Hong Park |
Cryptanalysis of the Public-Key Encryption Based on Braid Groups. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Burau representation, Cryptanalysis, Public-key encryption, Braid group |
30 | Ulrich Kühn 0001 |
Improved Cryptanalysis of MISTY1. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
Slicing Attack, Cryptanalysis, Block cipher, Impossible Differential |
30 | Tri Van Le, Yvo Desmedt |
Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection. |
Information Hiding |
2002 |
DBLP DOI BibTeX RDF |
watermark analysis, cryptanalysis, watermarking |
30 | Don Coppersmith, Shai Halevi, Charanjit S. Jutla |
Cryptanalysis of Stream Ciphers with Linear Masking. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
Linear masking, Low-Diffusion attacks, Stream ciphers, Hypothesis testing, Linear cryptanalysis |
30 | Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo |
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
NSS, Transcript Analysis, Cyclotomic Integer, Cryptanalysis, Lattice, Signature Scheme, Key Recovery, NTRU, Forgery |
30 | Amr M. Youssef, Guang Gong |
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
Imai and Matsumoto asymmetric cryptosystems, cryptanalysis, Public-key cryptosystems |
30 | Amr M. Youssef |
Cryptanalysis of the "Augmented Family of Cryptographic Parity Circuits" Proposed at ISW'97. |
Selected Areas in Cryptography |
2000 |
DBLP DOI BibTeX RDF |
augmented parity circuits, cryptanalysis, Block cipher |
30 | Eli Biham |
Cryptanalysis of Triple Modes of Operation. |
J. Cryptol. |
1999 |
DBLP DOI BibTeX RDF |
Triple modes of operation, Cryptanalysis, DES, Multiple encryption, Blockciphers |
30 | Marc Joye, Seungjoo Kim, Narn-Yih Lee |
Cryptanalysis of Two Group Signature Schemes. |
ISW |
1999 |
DBLP DOI BibTeX RDF |
Universal forgeries, Cryptanalysis, Digital signatures, Group signatures |
30 | Lars R. Knudsen, Willi Meier |
Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
Perceptron Problem, Simulated Annealing, Cryptanalysis, Identification Scheme |
30 | Eli Biham, Lars R. Knudsen |
Cryptanalysis of the ANSI X9.52 CBCM Mode. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
ANSI X9.52, C13CM mode, Cryptanalysis, Modes of operation, Multiple Encryption, Triple-DES |
30 | Alex Biryukov, Eyal Kushilevitz |
From Differential Cryptanalysis to Ciphertext-Only Attacks. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Madryga, RC5, ciphertext-only attack, differential-linear attack, block-ciphers, DES, differential cryptanalysis |
30 | David A. Wagner 0001, Bruce Schneier, John Kelsey |
Cryptanalysis of the Cellular Encryption Algorithm. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
cellular telephone, Cryptanalysis, block ciphers |
30 | Andrew Klapper, Mark Goresky |
Cryptanalysis Based on 2-Adic Rational Approximation. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
cryptanalysis, Binary sequences, rational approximation, feedback with carry shift registers, 2-adic numbers |
28 | Tanmoy Kanti Das, Subhamoy Maitra |
Analysis of the "Wavelet Tree Quantization" watermarking strategy and a modified robust scheme. |
Multim. Syst. |
2006 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Wavelet transform, Information security, Digital watermarking, Multimedia systems |
28 | Vivien Dubois, Louis Granboulan, Jacques Stern |
An Efficient Provable Distinguisher for HFE. |
ICALP (2) |
2006 |
DBLP DOI BibTeX RDF |
differential cryptanalysis, Multivariate cryptography, HFE |
28 | Louis Granboulan, Éric Levieil, Gilles Piret |
Pseudorandom Permutation Families over Abelian Groups. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
arbitrary domain, differential and linear cryptanalysis, block cipher |
28 | Florian Mendel, Norbert Pramstaller, Christian Rechberger |
Improved Collision Attack on the Hash Function Proposed at PKC'98. |
ICISC |
2006 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, collision, collision attack, differential attack, near-collision |
28 | Dag Arne Osvik, Adi Shamir, Eran Tromer |
Cache Attacks and Countermeasures: The Case of AES. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
cache, cryptanalysis, AES, side-channel attack, memory access |
28 | Amir Moradi 0001, Mohammad T. Manzuri Shalmani, Mahmoud Salmasizadeh |
A Generalized Method of Differential Fault Attack Against AES Cryptosystem. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Smart Card, AES, Side Channel Attacks, Fault Attacks |
28 | Benedikt Gierlichs, Kerstin Lemke-Rust, Christof Paar |
Templates vs. Stochastic Methods. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
High-Order Attacks, Performance Analysis, Stochastic Model, Power Analysis, Side Channel Cryptanalysis, Template Attack |
28 | Jorge Nakahara Jr., Daniel Santana de Freitas, Raphael Chung-Wei Phan |
New Multiset Attacks on Rijndael with Large Blocks. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
higher-order multiset attacks, cryptanalysis, Rijndael |
28 | Marco Macchetti, Mario Caironi, Luca Breveglieri, Alessandra Cherubini |
A Complete Formulation of Generalized Affine Equivalence. |
ICTCS |
2005 |
DBLP DOI BibTeX RDF |
generalized linear equivalence, Boolean functions, S-boxes, linear cryptanalysis |
28 | Tanmoy Kanti Das, Hyoung Joong Kim, Subhamoy Maitra |
Security Evaluation of Generalized Patchwork Algorithm from Cryptanalytic Viewpoint. |
KES (1) |
2005 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Information Security, Discrete Cosine Transform, Digital Watermarking, Multimedia Systems |
28 | Heiko Stamer |
Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
completion attack, Knuth-Bendix completion, Cryptanalysis, weak keys, Church-Rosser property, string-rewriting systems |
28 | Dai Watanabe, Soichi Furuya |
A MAC Forgery Attack on SOBER-128. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
SOBER, Stream cipher, Differential cryptanalysis, Message Authentication Code |
28 | Jovan Dj. Golic |
A Weakness of the Linear Part of Stream Cipher MUGI. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
combiners with memory, Stream ciphers, linear cryptanalysis, linear finite-state machines |
28 | Slobodan Petrovic, Amparo Fúster-Sabater |
Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
Irregular clocking, Cryptanalysis, Edit distance, Correlation attack, Directed search |
28 | Beomsik Song, Jennifer Seberry |
Consistent Differential Patterns of Rijndael. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
Consistent Differential Patterns, Differential Characteristics, Cryptanalysis, Rijndael |
28 | Raphael Chung-Wei Phan, Soichi Furuya |
Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
extended slide attacks, sliding property, cryptanalysis, Block ciphers, DES, key schedule |
28 | Pascal Junod |
On the Complexity of Matsui's Attack. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
DES, linear cryptanalysis |
28 | Liam Keliher, Henk Meijer, Stafford E. Tavares |
New Method for Upper Bounding the Maximum Average Linear Hull Probability for SPNs. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
substitution-permutation networks, maximum average linear hull probability, provable security, linear cryptanalysis |
28 | Siguna Müller, Winfried B. Müller |
The Security of Public Key Cryptosystems Based on Integer Factorization. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
factorization problem, Dickson cryptosystem, LUC cryptosystem, Williams cryptosystem, ElGamal cryptosystem, secure keys, cryptanalysis, Public-key cryptography, RSA cryptosystem, discrete logarithm problem |
28 | Paul Camion, Anne Canteaut |
Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Correlation-immune functions, cryptanalysis, stream ciphers, hash functions, orthogonal arrays |
28 | Paul C. van Oorschot, Michael J. Wiener |
Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
parallel collision search, low Hamming weight exponents, cryptanalysis, DES, Meet-in-the-middle attack |
28 | Gilles Piret, François-Xavier Standaert |
Provable security of block ciphers against linear cryptanalysis: a mission impossible? |
Des. Codes Cryptogr. |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60 |
28 | Eric Brier, Thomas Peyrin |
Cryptanalysis of CubeHash. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
CubeHash, hash functions, collision |
28 | Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang |
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
linear hulls, algebraic analysis, systems of sparse polynomial equations of low degree, RFID, block ciphers |
28 | Tim Güneysu, Timo Kasper, Martin Novotný, Christof Paar, Andy Rupp |
Cryptanalysis with COPACOBANA. |
IEEE Trans. Computers |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki |
Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher. |
IEEE Trans. Inf. Theory |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Juan M. Estévez-Tapiador, John A. Clark, Julio César Hernández Castro |
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
|
28 | S. Murphy |
The Independence of Linear Approximations in Symmetric Cryptanalysis. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Jesús Adolfo García-Pasquel, José Galaviz |
Ganzúa: A cryptanalysis tool for monoalphabetic and polyalphabetic ciphers. |
ACM J. Educ. Resour. Comput. |
2006 |
DBLP DOI BibTeX RDF |
classical cryptography, Cryptology |
28 | Pierre-Alain Fouque, Louis Granboulan, Jacques Stern |
Differential Cryptanalysis for Multivariate Schemes. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Jean-Sébastien Coron |
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Jean-Sébastien Coron, David Naccache |
Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
Fiat-Shamir Identification Protocol, Zero-knowledge |
28 | Nicolas T. Courtois |
Feistel Schemes and Bi-linear Cryptanalysis. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Eli Biham, Orr Dunkelman, Nathan Keller |
Differential-Linear Cryptanalysis of Serpent. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Tanmoy Kanti Das |
Cryptanalysis of Block Based Spatial Domain Watermarking Schemes. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Carlos Javier Hernández-Castro, L. Javier García-Villalba, Julio César Hernández Castro, José María Sierra |
On MARS's s-boxes Strength against Linear Cryptanalysis. |
ICCSA (3) |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Jean-Charles Faugère, Antoine Joux |
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Elad Barkan, Eli Biham, Nathan Keller |
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Yukiyasu Tsunoo, Teruo Saito, Tomoyasu Suzaki, Maki Shigeri, Hiroshi Miyauchi |
Cryptanalysis of DES Implemented on Computers with Cache. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
|
28 | François Koeune, Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Pierre David, Jean-Didier Legat |
An FPGA Implementation of the Linear Cryptanalysis. |
FPL |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee 0002, Jongin Lim 0001 |
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
|
Displaying result #101 - #200 of 4217 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|