|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2108 occurrences of 562 keywords
|
|
|
Results
Found 4217 publication records. Showing 4217 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee 0002, Jongin Lim 0001 |
Impossible Differential Cryptanalysis of Zodiac. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Haruki Seki, Toshinobu Kaneko |
Differential Cryptanalysis of Reduced Rounds of GOST. |
Selected Areas in Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
28 | John Kelsey, Bruce Schneier, David A. Wagner 0001 |
Mod n Cryptanalysis, with Applications Against RC5P and M6. |
FSE |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Mitsuru Matsui, Toshio Tokita |
Cryptanalysis of a Reduced Version of the Block Cipher E2. |
FSE |
1999 |
DBLP DOI BibTeX RDF |
|
28 | Philip Hawkes, Luke O'Connor |
On Applying Linear Cryptanalysis to IDEA. |
ASIACRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
28 | Howard M. Heys, Stafford E. Tavares |
The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
|
28 | Burton S. Kaliski Jr., Matthew J. B. Robshaw |
Linear Cryptanalysis Using Multiple Approximations. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
28 | Thomas A. Berson |
Differential Cryptanalysis Mod 2^32 with Applications to MD5. |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
28 | Hiroshi Miyano |
A Method to Estimate the Number of Ciphertext Pairs for Differential Cryptanalysis. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
28 | Valery I. Korzhik, Andrew I. Turkin |
Cryptanalysis of McEliece's Public-Key Cryptosystem. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
28 | Eli Biham, Adi Shamir |
Differential Cryptanalysis of Feal and N-Hash. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
28 | Eli Biham, Adi Shamir |
Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
26 | Joan Daemen, Mario Lamberger, Norbert Pramstaller, Vincent Rijmen, Frederik Vercauteren |
Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers. |
Computing |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A60, 11T71 |
26 | Jean-Charles Faugère |
Solving Structured Polynomial Systems and Applications to Cryptology. |
CASC |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Jean-Philippe Aumasson, Simon Fischer 0002, Shahram Khazaei, Willi Meier, Christian Rechberger |
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Atsushi Watanabe, Hiroshi Haruki, Shun Shimotomai, Takeshi Saito, Tomoyuki Nagase, Yoshio Yoshioka, Yoshiei Hasegawa |
A New Mutable Nonlinear Transformation Algorithm for S-box. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Jong Sou Park, Sung-Hwan Kim, Dong Seong Kim 0001 |
A Hardware Implementation of Lightweight Block Cipher for Ubiquitous Computing Security. |
KES (1) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Sandeep S. Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer, Manfred Schimmler |
Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Eli Biham, Orr Dunkelman, Nathan Keller |
New Combined Attacks on Block Ciphers. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Liam Keliher, Henk Meijer, Stafford E. Tavares |
Modeling Linear Characteristics of Substitution-Permutation Networks. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
26 | Thomas Pornin |
Optimal Resistance Against the Davies and Murphy Attack. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Jennifer Seberry, Xian-Mo Zhang, Yuliang Zheng 0001 |
Systematic Generation of Cryptographically Robust S-Boxes. |
CCS |
1993 |
DBLP DOI BibTeX RDF |
|
22 | Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, Mohammad Abdul Matin 0001 |
Effect of Security Increment to Symmetric Data Encryption through AES Methodology. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
plain text, cipher text, Block cipher, Computer Security, Differential cryptanalysis, Linear cryptanalysis, Symmetric Encryption |
22 | Andrey Bogdanov |
Linear Slide Attacks on the KeeLoq Block Cipher. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
KeeLoq, hopping codes, rolling codes, identify friend-or-foe, cryptanalysis, authentication protocols, linear cryptanalysis, key generation, slide attacks |
22 | Antoine Joux, Jacques Stern |
Lattice Reduction: A Toolbox for the Cryptanalyst. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
Knapsack cryptosystems, Knapsack cryptosystems, Cryptanalysis, Cryptanalysis, Lattices, Lattices, Key words |
22 | Lars R. Knudsen, Xuejia Lai, Bart Preneel |
Attacks on Fast Double Block Length Hash Functions. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Cryptanalysis, Block ciphers, Block ciphers, Key words, Cryptographic hash functions, Cryptographic hash functions, Birthday attacks, Birthday attacks, Double block length hash functions, Double block length hash functions |
22 | Sean Murphy |
An Analysis of SAFER. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
SAFER, Invariant Z -submodules, SAFER, Invariant Z -submodules, Cryptanalysis, Cryptanalysis, Block cipher, Block cipher, Key words |
22 | Xiaoyi Zhou, Jixin Ma 0001, Wencai Du, Bo Zhao, Mingrui Chen, Yongzhe Zhao |
Cryptanalysis of the Bisectional MQ Equations System. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Multivariate Quadratic, Relinearization, Cryptanalysis, Finite Field, Public Key Cryptosystems |
22 | Xiaoming Hu 0002, Tong Wang, Huajie Xu |
Cryptanalysis and Improvement of a HIBE and HIBS without Random Oracles. |
MVHI |
2010 |
DBLP DOI BibTeX RDF |
hierarchical identity-based signature, Security, cryptanalysis, hierarchical identity-based encryption |
22 | Serguei A. Mokhov |
Cryptolysis: A Framework for Verification of Optimization Heuristics for the Automated Cryptanalysis of Classical Ciphers and Natural Language Word Segmentation. |
SERA |
2010 |
DBLP DOI BibTeX RDF |
Cryptolysis, natural language word segmentation, MARF, frameworks, cryptanalysis |
22 | Phong Q. Nguyen, Oded Regev 0001 |
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
GGH, NTRUSign, Lattices, Moment, Gradient descent, Public-key cryptanalysis |
22 | Ping Luo, Haijian Zhou, Daoshun Wang, Yiqi Dai |
Cryptanalysis of RSA for a special case with d > e. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, RSA, LLL algorithm, lattice basis reduction |
22 | Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer |
Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
semi-free-start collision, known-key distinguisher, cryptanalysis, block cipher, hash function |
22 | Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan Sepehrdad |
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2). |
FSE |
2009 |
DBLP DOI BibTeX RDF |
ISDB, ARIB, MULTI2, block cipher, linear cryptanalysis, conditional access |
22 | Leonie Simpson, Matthew Henricksen, Wun-She Yap |
Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
Common Scrambling Algorithm, Cryptanalysis, Stream Cipher, Digital Video Broadcasting |
22 | Benoît Gérard, Jean-Pierre Tillich |
On Linear Cryptanalysis with Many Linear Approximations. |
IMACC |
2009 |
DBLP DOI BibTeX RDF |
multiple linear approximations, information theory, linear cryptanalysis |
22 | Abderrahmane Nitaj |
Cryptanalysis of RSA Using the Ratio of the Primes. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Coppersmith’s Method, Cryptanalysis, RSA, Factorization, Continued Fraction |
22 | Jean-Sébastien Coron, David Naccache, Mehdi Tibouchi, Ralf-Philipp Weinmann |
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
iso/iec 9796-2, digital signatures, rsa, public-key cryptanalysis, forgery, emv |
22 | Tomohiro Shintani, Ryuichi Sakai |
Cryptanalysis on 2 Dimensional Subset-sum Public Key Cryptosystem. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
knapsack public key cryptosystem, cryptanalysis, lattice, shortest vector problem |
22 | JeaHoon Park, KiSeok Bae, Sang-Jae Moon, Dooho Choi, You Sung Kang, JaeCheol Ha |
A new fault cryptanalysis on montgomery ladder exponentiation algorithm. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
Montgomery ladder exponentiation algorithm, fault analysis attack, RSA, physical cryptanalysis |
22 | Don Coppersmith, Jean-Sébastien Coron, François Grieu, Shai Halevi, Charanjit S. Jutla, David Naccache, Julien P. Stern |
Cryptanalysis of ISO/IEC 9796-1. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
ISO/IEC 9796-1 signature standard, Rabin signatures, Cryptanalysis, Encoding scheme, RSA signatures |
22 | Tianjie Cao, Peng Shen, Elisa Bertino |
Cryptanalysis of the LCSS RFID Authentication Protocol. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Authentication, RFID, Cryptanalysis |
22 | Debasis Giri, Parmeshwary Dayal Srivastava |
Cryptanalysis and Improvement of a Remote User Authentication Scheme using Smart Cards. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Cryptanalysis, Smart Card, Timestamp |
22 | Huaqun Wang, Hong Yu |
Cryptanalysis of Two Ring Signcryption Schemes. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Ring signcryption, privacy and trust, cryptanalysis, certificateless cryptography |
22 | Xiangsheng Xia, Hongyun Wan, Fan Hong, Guohua Cui |
Cryptanalysis of an Improved Forward Secure Proxy Signature Scheme. |
PACIIA (1) |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, security analysis, forward security, proxy signature |
22 | Eun-Jun Yoon, Eun-Jung Lee, Kee-Young Yoo |
Cryptanalysis of Wang et al.'s Remote User Authentication Scheme Using Smart Cards. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Cryptography, Cryptanalysis, Smart card, Password, Session key |
22 | Lei Zhang 0012, Wentao Zhang, Wenling Wu |
Cryptanalysis of Reduced-Round SMS4 Block Cipher. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
SMS4, Differential characteristic, Block cipher, Differential cryptanalysis, Rectangle attack |
22 | S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan |
Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Provable Security, Bilinear Pairing, Broadcast Encryption, Signcryption, Random Oracle, ID-based Cryptosystem |
22 | Joo Yeon Cho, Miia Hermelin, Kaisa Nyberg |
A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
Multidimensional Linear Approximation, Block Ciphers, Linear Cryptanalysis, Serpent |
22 | Orhun Kara |
Reflection Cryptanalysis of Some Ciphers. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Round Function, Round Key, Cryptanalysis, Block Cipher, Self-similarity, Related Key Attack, Slide Attack, Key Schedule, Reflection attack |
22 | Pierre-Alain Fouque, Gaëtan Leurent |
Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash function, provable security, syndrome decoding, quasi-cyclic code |
22 | Mohammad Ali Orumiehchiha, S. Fahimeh Mohebbipoor, Hossein Ghodosi |
Cryptanalysis of MV3 Stream Cipher. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
MV3 Algorithm, Cryptanalysis, Stream Ciphers, Distinguishing Attack |
22 | Julien Bringer, Hervé Chabanne, Thomas Icart |
Cryptanalysis of EC-RAC, a RFID Identification Protocol. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Privacy, RFID, Cryptanalysis, Identification, Zero-Knowledge |
22 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Marcin Kontak, Janusz Szmidt |
Cryptanalysis of the GOST Hash Function. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash function, collision attack, preimage attack, second preimage attack |
22 | Xiao-Li Huang, Chuan-Kun Wu |
Cryptanalysis of Achterbahn-Version 1 and -Version 2. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream cipher, distinguishing attack, cryptology, eSTREAM |
22 | Leo Dorrendorf, Zvi Gutterman, Benny Pinkas |
Cryptanalysis of the windows random number generator. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
pseudo random number generator (prng), windows operating system, cryptanalysis |
22 | María Naya-Plasencia |
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack |
22 | Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern |
Cryptanalysis of the SFLASH Signature Scheme. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
signature, differential cryptanalysis, multivariate cryptography, SFLASH |
22 | Dirk Stegemann |
Extended BDD-Based Cryptanalysis of Keystream Generators. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
F-FCSR, cryptanalysis, Stream cipher, BDD, Trivium, Grain |
22 | Matthew Henricksen, Lars R. Knudsen |
Cryptanalysis of the CRUSH Hash Function. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
CRUSH, Iterated Halving, Cryptanalysis, Hash Functions, Collisions, Second preimages |
22 | Xuyun Nie, Lei Hu, Jintai Ding, Jianyu Li, John Wagner |
Cryptanalysis of the TRMC-4 Public Key Cryptosystem. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
TRMC, linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem |
22 | Florian Mendel, Vincent Rijmen |
Cryptanalysis of the Tiger Hash Function. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
pseudo-collision, pseudo-near-collision, Cryptanalysis, hash functions, collision, differential attack, near-collision |
22 | Vivien Dubois, Louis Granboulan, Jacques Stern |
Cryptanalysis of HFE with Internal Perturbation. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
internal perturbation, binary vector spaces, differential cryptanalysis, multivariate cryptography, HFE |
22 | María Naya-Plasencia |
Cryptanalysis of Achterbahn-128/80. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack |
22 | Hongjun Wu 0001, Bart Preneel |
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Py, Py6, Pypy, Stream Cipher, Differential Cryptanalysis |
22 | Haina Zhang, Xiaoyun Wang 0001 |
Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
T-function, chosen IV attack, TSC-4, stream cipher, Differential cryptanalysis |
22 | Jiqiang Lu |
Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
HIGHT, Block cipher, Related-key attack, Impossible differential cryptanalysis, Rectangle attack |
22 | Willi Geiselmann, Rainer Steinwandt |
Cryptanalysis of a Hash Function Proposed at ICISC 2006. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash function |
22 | Alexander Maximov |
Cryptanalysis of the "Grain" family of stream ciphers. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
decoding problem, cryptanalysis, correlation attacks, distinguisher, grain |
22 | Martin Hell, Thomas Johansson 0001 |
Cryptanalysis of Achterbahn-Version 2. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream ciphers, key recovery attack |
22 | Martin Hell, Thomas Johansson 0001 |
On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
cryptanalysis, stream ciphers, linear approximation, Pomaranch |
22 | Jie Liu, Lei Fan 0002, Jianhua Li 0001 |
Cryptanalysis and improvement on Yang-Shieh authentication schemes. |
PST |
2006 |
DBLP DOI BibTeX RDF |
cryptanalysis, smart cards, information security, remote authentication |
22 | Feng Bao 0001 |
Cryptanalysis of a Partially Known Cellular Automata Cryptosystem. |
IEEE Trans. Computers |
2004 |
DBLP DOI BibTeX RDF |
cryptanalysis, Cellular automata, encryption, chosen-plaintext attack |
22 | Li-Hua Li, Chi-Yu Liu, Min-Shiang Hwang |
Cryptanalysis of an efficient secure group signature scheme. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
security, cryptanalysis, group signature, discrete logarithm |
22 | David A. Wagner 0001 |
Cryptanalysis of a provably secure CRT-RSA algorithm. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
cryptanalysis, RSA, chinese remainder theorem, fault attacks |
22 | Benne de Weger |
Cryptanalysis of RSA with Small Prime Difference. |
Appl. Algebra Eng. Commun. Comput. |
2002 |
DBLP DOI BibTeX RDF |
Fermat Factoring, Wiener Attack, Boneh-Durfee Attack, Cryptanalysis, RSA |
22 | Sung-Ming Yen, Marc Joye |
Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis. |
IEEE Trans. Computers |
2000 |
DBLP DOI BibTeX RDF |
fault-based cryptanalysis, interleaved modular multiplication, Cryptography, exponentiation, tamper resistance |
22 | Eric R. Verheul, Henk C. A. van Tilborg |
Cryptanalysis of 'Less Short' RSA Secret Exponents. |
Appl. Algebra Eng. Commun. Comput. |
1997 |
DBLP DOI BibTeX RDF |
RSA system, Cryptanalysis, Continued fractions |
22 | Chi-Sung Laih, Min-Jea Gau |
Cryptanalysis if a Diophantine Equation Oriented Public Key Cryptosystem. |
IEEE Trans. Computers |
1997 |
DBLP DOI BibTeX RDF |
knapsack cryptosystem, cryptography, cryptanalysis, Public keys |
21 | Margret Sharmila F, K. Karuppasamy |
An effective cryptanalysis of DES for secure communication using hybrid cryptanalysis and deep neural network. |
Concurr. Comput. Pract. Exp. |
2024 |
DBLP DOI BibTeX RDF |
|
21 | Tao Ye, Yongzhuang Wei, Lingcheng Li, Enes Pasalic |
Impossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class Permutation. |
ISPEC |
2021 |
DBLP DOI BibTeX RDF |
|
21 | Patrick Derbez, Virginie Lallemand, Aleksei Udovenko |
Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition. |
SAC |
2019 |
DBLP DOI BibTeX RDF |
|
21 | Eli Biham, Stav Perle |
Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity. |
IACR Trans. Symmetric Cryptol. |
2018 |
DBLP DOI BibTeX RDF |
|
21 | Sankhanil Dey, Ranjan Ghosh |
A review of existing 4-bit crypto S-box cryptanalysis techniques and two new techniques with 4-bit Boolean functions for cryptanalysis of 4-bit crypto S-boxes. |
PeerJ Prepr. |
2017 |
DBLP DOI BibTeX RDF |
|
21 | Sankhanil Dey, Ranjan Ghosh |
A Review of Existing 4-bit Crypto S-box cryptanalysis Techniques and Two New Techniques with 4-bit Boolean Functions for Cryptanalysis of 4-bit Crypto S-boxes. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
21 | Mrudula Sarvabhatla, M. Giri, Chandra Sekhar Vorugunti |
Cryptanalysis of Cryptanalysis and Improvement of Yan et al Biometric-Based Authentication Scheme for TMIS. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
21 | Jiageng Chen, Atsuko Miyaji |
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock. |
CD-ARES Workshops |
2013 |
DBLP DOI BibTeX RDF |
|
21 | Christian Rechberger |
On Bruteforce-Like Cryptanalysis: New Meet-in-the-Middle Attacks in Symmetric Cryptanalysis. |
ICISC |
2012 |
DBLP DOI BibTeX RDF |
|
21 | John A. Clark, Susan Stepney |
Fusing Natural Computational Paradigms for Cryptanalysis. Or, Using Heuristic Search to Bring Cryptanalysis Problems within Quantum Computational Range. |
IEEE Congress on Evolutionary Computation |
2006 |
DBLP DOI BibTeX RDF |
|
21 | Jaechul Sung, Sangjin Lee 0002, Jong In Lim 0001, Seokhie Hong, Sangjoon Park |
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Florian Mendel, Christian Rechberger, Martin Schläffer |
MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, combiner, differential, MD5 |
20 | Ewan Fleischmann, Michael Gorski, Stefan Lucks |
Attacking 9 and 10 Rounds of AES-256. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
related-key boomerang attack, block ciphers, AES, differential cryptanalysis |
20 | Mohamed Saied Emam Mohamed, Jintai Ding, Johannes Buchmann 0001, Fabian Werner |
Algebraic Attack on the MQQ Public Key Cryptosystem. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
MQQ public key cryptosystem, MutantXL algorithm, F4 algorithm, Algebraic Cryptanalysis |
20 | Tim Güneysu, Christof Paar, Jan Pelzl |
Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem. |
ACM Trans. Reconfigurable Technol. Syst. |
2008 |
DBLP DOI BibTeX RDF |
Pollard's rho, cryptanalysis, elliptic curve cryptosystem, Discrete logarithm |
20 | Wenying Zhang, Jing Han |
Impossible Differential Analysis of Reduced Round CLEFIA. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Block cipher, Data complexity, Impossible differential cryptanalysis, CLEFIA |
20 | Ascensión Hernández Encinas, Ángel Martín del Rey, José Luis Pérez Iglesias, Gerardo Rodríguez Sánchez, Araceli Queiruga Dios |
Cryptographic Properties of Second-Order Memory Elementary Cellular Automata. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
cryptography, Cellular automata, memory, differential cryptanalysis |
20 | Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson |
Bit-Pattern Based Integral Attack. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
integral cryptanalysis, Noekeon, Block ciphers, present, Serpent |
20 | Gaëtan Leurent |
MD4 is Not One-Way. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash function, preimage, MD4, one-way |
20 | Santanu Sarkar 0001, Subhamoy Maitra |
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys |
20 | Samuel Galice, Marine Minier |
Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
integral attacks, Rijndael-256, cryptanalysis, block cipher |
Displaying result #201 - #300 of 4217 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|