The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Cryptanalysis with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1982 (17) 1983-1985 (15) 1986-1988 (18) 1989-1990 (17) 1991 (19) 1992-1993 (37) 1994 (34) 1995 (18) 1996 (26) 1997 (34) 1998 (48) 1999 (43) 2000 (56) 2001 (80) 2002 (91) 2003 (108) 2004 (113) 2005 (172) 2006 (171) 2007 (181) 2008 (222) 2009 (206) 2010 (142) 2011 (177) 2012 (171) 2013 (152) 2014 (175) 2015 (209) 2016 (205) 2017 (168) 2018 (186) 2019 (188) 2020 (158) 2021 (174) 2022 (160) 2023 (183) 2024 (43)
Publication types (Num. hits)
article(2176) book(10) incollection(26) inproceedings(1893) phdthesis(112)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2108 occurrences of 562 keywords

Results
Found 4217 publication records. Showing 4217 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
28Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee 0002, Jongin Lim 0001 Impossible Differential Cryptanalysis of Zodiac. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Haruki Seki, Toshinobu Kaneko Differential Cryptanalysis of Reduced Rounds of GOST. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28John Kelsey, Bruce Schneier, David A. Wagner 0001 Mod n Cryptanalysis, with Applications Against RC5P and M6. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
28Mitsuru Matsui, Toshio Tokita Cryptanalysis of a Reduced Version of the Block Cipher E2. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
28Philip Hawkes, Luke O'Connor On Applying Linear Cryptanalysis to IDEA. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
28Howard M. Heys, Stafford E. Tavares The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
28Burton S. Kaliski Jr., Matthew J. B. Robshaw Linear Cryptanalysis Using Multiple Approximations. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
28Thomas A. Berson Differential Cryptanalysis Mod 2^32 with Applications to MD5. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
28Hiroshi Miyano A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
28Valery I. Korzhik, Andrew I. Turkin Cryptanalysis of McEliece's Public-Key Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
28Eli Biham, Adi Shamir Differential Cryptanalysis of Feal and N-Hash. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
28Eli Biham, Adi Shamir Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
26Joan Daemen, Mario Lamberger, Norbert Pramstaller, Vincent Rijmen, Frederik Vercauteren Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers. Search on Bibsonomy Computing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A60, 11T71
26Jean-Charles Faugère Solving Structured Polynomial Systems and Applications to Cryptology. Search on Bibsonomy CASC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Jean-Philippe Aumasson, Simon Fischer 0002, Shahram Khazaei, Willi Meier, Christian Rechberger New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Atsushi Watanabe, Hiroshi Haruki, Shun Shimotomai, Takeshi Saito, Tomoyuki Nagase, Yoshio Yoshioka, Yoshiei Hasegawa A New Mutable Nonlinear Transformation Algorithm for S-box. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Jong Sou Park, Sung-Hwan Kim, Dong Seong Kim 0001 A Hardware Implementation of Lightweight Block Cipher for Ubiquitous Computing Security. Search on Bibsonomy KES (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Sandeep S. Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer, Manfred Schimmler Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Eli Biham, Orr Dunkelman, Nathan Keller New Combined Attacks on Block Ciphers. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Liam Keliher, Henk Meijer, Stafford E. Tavares Modeling Linear Characteristics of Substitution-Permutation Networks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
26Thomas Pornin Optimal Resistance Against the Davies and Murphy Attack. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng 0001 Systematic Generation of Cryptographically Robust S-Boxes. Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
22Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, Mohammad Abdul Matin 0001 Effect of Security Increment to Symmetric Data Encryption through AES Methodology. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF plain text, cipher text, Block cipher, Computer Security, Differential cryptanalysis, Linear cryptanalysis, Symmetric Encryption
22Andrey Bogdanov Linear Slide Attacks on the KeeLoq Block Cipher. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF KeeLoq, hopping codes, rolling codes, identify friend-or-foe, cryptanalysis, authentication protocols, linear cryptanalysis, key generation, slide attacks
22Antoine Joux, Jacques Stern Lattice Reduction: A Toolbox for the Cryptanalyst. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Knapsack cryptosystems, Knapsack cryptosystems, Cryptanalysis, Cryptanalysis, Lattices, Lattices, Key words
22Lars R. Knudsen, Xuejia Lai, Bart Preneel Attacks on Fast Double Block Length Hash Functions. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Cryptanalysis, Cryptanalysis, Block ciphers, Block ciphers, Key words, Cryptographic hash functions, Cryptographic hash functions, Birthday attacks, Birthday attacks, Double block length hash functions, Double block length hash functions
22Sean Murphy An Analysis of SAFER. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF SAFER, Invariant Z -submodules, SAFER, Invariant Z -submodules, Cryptanalysis, Cryptanalysis, Block cipher, Block cipher, Key words
22Xiaoyi Zhou, Jixin Ma 0001, Wencai Du, Bo Zhao, Mingrui Chen, Yongzhe Zhao Cryptanalysis of the Bisectional MQ Equations System. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Multivariate Quadratic, Relinearization, Cryptanalysis, Finite Field, Public Key Cryptosystems
22Xiaoming Hu 0002, Tong Wang, Huajie Xu Cryptanalysis and Improvement of a HIBE and HIBS without Random Oracles. Search on Bibsonomy MVHI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF hierarchical identity-based signature, Security, cryptanalysis, hierarchical identity-based encryption
22Serguei A. Mokhov Cryptolysis: A Framework for Verification of Optimization Heuristics for the Automated Cryptanalysis of Classical Ciphers and Natural Language Word Segmentation. Search on Bibsonomy SERA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Cryptolysis, natural language word segmentation, MARF, frameworks, cryptanalysis
22Phong Q. Nguyen, Oded Regev 0001 Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF GGH, NTRUSign, Lattices, Moment, Gradient descent, Public-key cryptanalysis
22Ping Luo, Haijian Zhou, Daoshun Wang, Yiqi Dai Cryptanalysis of RSA for a special case with d > e. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, RSA, LLL algorithm, lattice basis reduction
22Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF semi-free-start collision, known-key distinguisher, cryptanalysis, block cipher, hash function
22Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan Sepehrdad Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2). Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ISDB, ARIB, MULTI2, block cipher, linear cryptanalysis, conditional access
22Leonie Simpson, Matthew Henricksen, Wun-She Yap Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Common Scrambling Algorithm, Cryptanalysis, Stream Cipher, Digital Video Broadcasting
22Benoît Gérard, Jean-Pierre Tillich On Linear Cryptanalysis with Many Linear Approximations. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple linear approximations, information theory, linear cryptanalysis
22Abderrahmane Nitaj Cryptanalysis of RSA Using the Ratio of the Primes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Coppersmith’s Method, Cryptanalysis, RSA, Factorization, Continued Fraction
22Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF iso/iec 9796-2, digital signatures, rsa, public-key cryptanalysis, forgery, emv
22Tomohiro Shintani, Ryuichi Sakai Cryptanalysis on 2 Dimensional Subset-sum Public Key Cryptosystem. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF knapsack public key cryptosystem, cryptanalysis, lattice, shortest vector problem
22JeaHoon Park, KiSeok Bae, Sang-Jae Moon, Dooho Choi, You Sung Kang, JaeCheol Ha A new fault cryptanalysis on montgomery ladder exponentiation algorithm. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Montgomery ladder exponentiation algorithm, fault analysis attack, RSA, physical cryptanalysis
22Don Coppersmith, Jean-Sébastien Coron, François Grieu, Shai Halevi, Charanjit S. Jutla, David Naccache, Julien P. Stern Cryptanalysis of ISO/IEC 9796-1. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ISO/IEC 9796-1 signature standard, Rabin signatures, Cryptanalysis, Encoding scheme, RSA signatures
22Tianjie Cao, Peng Shen, Elisa Bertino Cryptanalysis of the LCSS RFID Authentication Protocol. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, RFID, Cryptanalysis
22Debasis Giri, Parmeshwary Dayal Srivastava Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Cryptanalysis, Smart Card, Timestamp
22Huaqun Wang, Hong Yu Cryptanalysis of Two Ring Signcryption Schemes. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ring signcryption, privacy and trust, cryptanalysis, certificateless cryptography
22Xiangsheng Xia, Hongyun Wan, Fan Hong, Guohua Cui Cryptanalysis of an Improved Forward Secure Proxy Signature Scheme. Search on Bibsonomy PACIIA (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, security analysis, forward security, proxy signature
22Eun-Jun Yoon, Eun-Jung Lee, Kee-Young Yoo Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Cryptography, Cryptanalysis, Smart card, Password, Session key
22Lei Zhang 0012, Wentao Zhang, Wenling Wu Cryptanalysis of Reduced-Round SMS4 Block Cipher. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SMS4, Differential characteristic, Block cipher, Differential cryptanalysis, Rectangle attack
22S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Provable Security, Bilinear Pairing, Broadcast Encryption, Signcryption, Random Oracle, ID-based Cryptosystem
22Joo Yeon Cho, Miia Hermelin, Kaisa Nyberg A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multidimensional Linear Approximation, Block Ciphers, Linear Cryptanalysis, Serpent
22Orhun Kara Reflection Cryptanalysis of Some Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Round Function, Round Key, Cryptanalysis, Block Cipher, Self-similarity, Related Key Attack, Slide Attack, Key Schedule, Reflection attack
22Pierre-Alain Fouque, Gaëtan Leurent Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, provable security, syndrome decoding, quasi-cyclic code
22Mohammad Ali Orumiehchiha, S. Fahimeh Mohebbipoor, Hossein Ghodosi Cryptanalysis of MV3 Stream Cipher. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MV3 Algorithm, Cryptanalysis, Stream Ciphers, Distinguishing Attack
22Julien Bringer, Hervé Chabanne, Thomas Icart Cryptanalysis of EC-RAC, a RFID Identification Protocol. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privacy, RFID, Cryptanalysis, Identification, Zero-Knowledge
22Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt Cryptanalysis of the GOST Hash Function. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, collision attack, preimage attack, second preimage attack
22Xiao-Li Huang, Chuan-Kun Wu Cryptanalysis of Achterbahn-Version 1 and -Version 2. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream cipher, distinguishing attack, cryptology, eSTREAM
22Leo Dorrendorf, Zvi Gutterman, Benny Pinkas Cryptanalysis of the windows random number generator. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pseudo random number generator (prng), windows operating system, cryptanalysis
22María Naya-Plasencia Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack
22Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern Cryptanalysis of the SFLASH Signature Scheme. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF signature, differential cryptanalysis, multivariate cryptography, SFLASH
22Dirk Stegemann Extended BDD-Based Cryptanalysis of Keystream Generators. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF F-FCSR, cryptanalysis, Stream cipher, BDD, Trivium, Grain
22Matthew Henricksen, Lars R. Knudsen Cryptanalysis of the CRUSH Hash Function. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF CRUSH, Iterated Halving, Cryptanalysis, Hash Functions, Collisions, Second preimages
22Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner Cryptanalysis of the TRMC-4 Public Key Cryptosystem. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF TRMC, linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem
22Florian Mendel, Vincent Rijmen Cryptanalysis of the Tiger Hash Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pseudo-collision, pseudo-near-collision, Cryptanalysis, hash functions, collision, differential attack, near-collision
22Vivien Dubois, Louis Granboulan, Jacques Stern Cryptanalysis of HFE with Internal Perturbation. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF internal perturbation, binary vector spaces, differential cryptanalysis, multivariate cryptography, HFE
22María Naya-Plasencia Cryptanalysis of Achterbahn-128/80. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack
22Hongjun Wu 0001, Bart Preneel Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Py, Py6, Pypy, Stream Cipher, Differential Cryptanalysis
22Haina Zhang, Xiaoyun Wang 0001 Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF T-function, chosen IV attack, TSC-4, stream cipher, Differential cryptanalysis
22Jiqiang Lu Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF HIGHT, Block cipher, Related-key attack, Impossible differential cryptanalysis, Rectangle attack
22Willi Geiselmann, Rainer Steinwandt Cryptanalysis of a Hash Function Proposed at ICISC 2006. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function
22Alexander Maximov Cryptanalysis of the "Grain" family of stream ciphers. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF decoding problem, cryptanalysis, correlation attacks, distinguisher, grain
22Martin Hell, Thomas Johansson 0001 Cryptanalysis of Achterbahn-Version 2. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream ciphers, key recovery attack
22Martin Hell, Thomas Johansson 0001 On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalysis, stream ciphers, linear approximation, Pomaranch
22Jie Liu, Lei Fan 0002, Jianhua Li 0001 Cryptanalysis and improvement on Yang-Shieh authentication schemes. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalysis, smart cards, information security, remote authentication
22Feng Bao 0001 Cryptanalysis of a Partially Known Cellular Automata Cryptosystem. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptanalysis, Cellular automata, encryption, chosen-plaintext attack
22Li-Hua Li, Chi-Yu Liu, Min-Shiang Hwang Cryptanalysis of an efficient secure group signature scheme. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF security, cryptanalysis, group signature, discrete logarithm
22David A. Wagner 0001 Cryptanalysis of a provably secure CRT-RSA algorithm. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptanalysis, RSA, chinese remainder theorem, fault attacks
22Benne de Weger Cryptanalysis of RSA with Small Prime Difference. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Fermat Factoring, Wiener Attack, Boneh-Durfee Attack, Cryptanalysis, RSA
22Sung-Ming Yen, Marc Joye Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2000 DBLP  DOI  BibTeX  RDF fault-based cryptanalysis, interleaved modular multiplication, Cryptography, exponentiation, tamper resistance
22Eric R. Verheul, Henk C. A. van Tilborg Cryptanalysis of 'Less Short' RSA Secret Exponents. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF RSA system, Cryptanalysis, Continued fractions
22Chi-Sung Laih, Min-Jea Gau Cryptanalysis if a Diophantine Equation Oriented Public Key Cryptosystem. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1997 DBLP  DOI  BibTeX  RDF knapsack cryptosystem, cryptography, cryptanalysis, Public keys
21Margret Sharmila F, K. Karuppasamy An effective cryptanalysis of DES for secure communication using hybrid cryptanalysis and deep neural network. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
21Tao Ye, Yongzhuang Wei, Lingcheng Li, Enes Pasalic Impossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class Permutation. Search on Bibsonomy ISPEC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
21Patrick Derbez, Virginie Lallemand, Aleksei Udovenko Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition. Search on Bibsonomy SAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
21Eli Biham, Stav Perle Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
21Sankhanil Dey, Ranjan Ghosh A review of existing 4-bit crypto S-box cryptanalysis techniques and two new techniques with 4-bit Boolean functions for cryptanalysis of 4-bit crypto S-boxes. Search on Bibsonomy PeerJ Prepr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
21Sankhanil Dey, Ranjan Ghosh A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
21Mrudula Sarvabhatla, M. Giri, Chandra Sekhar Vorugunti Cryptanalysis of Cryptanalysis and Improvement of Yan et al Biometric-Based Authentication Scheme for TMIS. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
21Jiageng Chen, Atsuko Miyaji Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock. Search on Bibsonomy CD-ARES Workshops The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
21Christian Rechberger On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
21John A. Clark, Susan Stepney Fusing Natural Computational Paradigms for Cryptanalysis. Or, Using Heuristic Search to Bring Cryptanalysis Problems within Quantum Computational Range. Search on Bibsonomy IEEE Congress on Evolutionary Computation The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
21Jaechul Sung, Sangjin Lee 0002, Jong In Lim 0001, Seokhie Hong, Sangjoon Park Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Florian Mendel, Christian Rechberger, Martin Schläffer MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, combiner, differential, MD5
20Ewan Fleischmann, Michael Gorski, Stefan Lucks Attacking 9 and 10 Rounds of AES-256. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF related-key boomerang attack, block ciphers, AES, differential cryptanalysis
20Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann 0001, Fabian Werner Algebraic Attack on the MQQ Public Key Cryptosystem. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MQQ public key cryptosystem, MutantXL algorithm, F4 algorithm, Algebraic Cryptanalysis
20Tim Güneysu, Christof Paar, Jan Pelzl Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem. Search on Bibsonomy ACM Trans. Reconfigurable Technol. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pollard's rho, cryptanalysis, elliptic curve cryptosystem, Discrete logarithm
20Wenying Zhang, Jing Han Impossible Differential Analysis of Reduced Round CLEFIA. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Block cipher, Data complexity, Impossible differential cryptanalysis, CLEFIA
20Ascensión Hernández Encinas, Ángel Martín del Rey, José Luis Pérez Iglesias, Gerardo Rodríguez Sánchez, Araceli Queiruga Dios Cryptographic Properties of Second-Order Memory Elementary Cellular Automata. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptography, Cellular automata, memory, differential cryptanalysis
20Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson Bit-Pattern Based Integral Attack. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integral cryptanalysis, Noekeon, Block ciphers, present, Serpent
20Gaëtan Leurent MD4 is Not One-Way. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, preimage, MD4, one-way
20Santanu Sarkar 0001, Subhamoy Maitra Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys
20Samuel Galice, Marine Minier Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integral attacks, Rijndael-256, cryptanalysis, block cipher
Displaying result #201 - #300 of 4217 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license