|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2108 occurrences of 562 keywords
|
|
|
Results
Found 4217 publication records. Showing 4217 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Eun-Jun Yoon, Kee-Young Yoo |
Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Cryptanalysis, Smart card, Password, Key agreement |
20 | Markku-Juhani Olavi Saarinen |
A Meet-in-the-Middle Collision Attack Against the New FORK-256. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
FORK-256, Hash Function Cryptanalysis, Meet-in-the-middle Attack |
20 | Wentao Zhang, Lei Zhang 0012, Wenling Wu, Dengguo Feng |
Related-Key Differential-Linear Attacks on Reduced AES-192. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
related-key, differential-linear attack, cryptanalysis, AES |
20 | Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Second Preimages for SMASH. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
SMASH, cryptanalysis, hash functions, second preimages |
20 | Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan |
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, stream cipher, random walks, expander graph |
20 | Kerstin Lemke-Rust, Christof Paar |
Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
Boolean Masking, Multivariate Side Channel Analysis, Higher-Order Side Channel Analysis, Stochastic Methods, Side Channel Cryptanalysis |
20 | Christian Rechberger, Vincent Rijmen, Nicolas Sklavos 0001 |
The NIST Cryptographic Workshop on Hash Functions. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
security, cryptanalysis, hash functions, SHA-1 |
20 | David Galindo, Paz Morillo, Carla Ràfols |
Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes. |
EuroPKI |
2006 |
DBLP DOI BibTeX RDF |
certificate-based and certificate-less encryption, cryptanalysis, public-key infrastructure, identity-based encryption |
20 | Goce Jakimoski |
Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
multicast stream authentication, cryptanalysis, block ciphers, message authentication, related-key attacks, TESLA |
20 | Tor Helleseth, Cees J. A. Jansen, Shahram Khazaei, Alexander Kholosha |
Security of Jump Controlled Sequence Generators for Stream Ciphers. |
SETA |
2006 |
DBLP DOI BibTeX RDF |
jump register, key-stream generator, linear relations, Cryptanalysis, stream cipher, Pomaranch |
20 | Ellen Jochemsz, Alexander May 0001 |
A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
small roots, Coppersmith’s method, RSA variants, cryptanalysis, lattices |
20 | Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede |
Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking. |
ARC |
2006 |
DBLP DOI BibTeX RDF |
exhaustive key search, cryptanalysis, hash-functions, FPGA implementation, time-memory trade-off, rainbow table |
20 | Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman |
Related-Key Rectangle Attack on 42-Round SHACAL-2. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
SHACAL-2, Block cipher, Differential cryptanalysis, Related-key rectangle attack |
20 | Ellen Jochemsz, Benne de Weger |
A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
partial key exposure, inhomogeneous diophantine approximation, cryptanalysis, RSA, lattice basis reduction |
20 | Matthias Krause 0001, Dirk Stegemann |
Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Bluetooth E0, GSM A5/1, cryptanalysis, Stream cipher, BDD, self-shrinking generator |
20 | Hongjun Wu 0001, Bart Preneel |
Resynchronization Attacks on WG and LEX. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
resynchronization attack, WG, cryptanalysis, stream cipher, differential attack, LEX, slide attack |
20 | Jonathan J. Hoch, Adi Shamir |
Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
iterated hash functions, tree based hash functions, multicollisions, cryptanalysis, Hash functions |
20 | Jean-Charles Faugère, Ludovic Perret |
Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. |
EUROCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Isomorphism of Polynomials (IP), Gröbner bases, Cryptanalysis, Public-Key Cryptography, F5 algorithm |
20 | Michele Boreale |
Attacking Right-to-Left Modular Exponentiation with Timely Random Faults. |
FDTC |
2006 |
DBLP DOI BibTeX RDF |
fault-based cryptanalysis, public-key cryptosystems, smartcards |
20 | Hong-Su Cho, Sangwoo Park, Soo Hak Sung, Aaram Yun |
Collision Search Attack for 53-Step HAS-160. |
ICISC |
2006 |
DBLP DOI BibTeX RDF |
collision search attack, HAS-160, cryptanalysis, hash function |
20 | Sourav Mukhopadhyay, Palash Sarkar 0001 |
On the Effectiveness of TMTO and Exhaustive Search Attacks. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
cryptanalysis, one-way function |
20 | Baocang Wang, Yupu Hu |
Diophantine Approximation Attack on a Fast Public Key Cryptosystem. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Simultaneous Diophantine approximation problem, Cryptanalysis, Public-key cryptosystem, Lattice basis reduction, Diophantine approximation |
20 | Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman |
Differential and Rectangle Attacks on Reduced-Round SHACAL-1. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
SHACAL-1, Amplified boomerang attack, Block cipher, Differential cryptanalysis, Rectangle attack |
20 | Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui 0001, Kanta Matsuura |
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
LPN problem, HB protocols, RFID authentication, cryptanalysis, fast correlation attacks |
20 | Eun-Jun Yoon, Kee-Young Yoo |
An Improved Popescu's Authenticated Key Agreement Protocol. |
ICCSA (5) |
2006 |
DBLP DOI BibTeX RDF |
Security, Cryptography, Cryptanalysis, Elliptic curve cryptosystems, Key agreement |
20 | Jiqiang Lu, Changhoon Lee, Jongsung Kim |
Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
Cobra-F64a, Cobra-F64b, Block cipher, Differential cryptanalysis, Related-key attacks, Data-dependent permutation |
20 | Jingmei Liu, Xiangguo Cheng, Xinmei Wang |
Methods to Forge ElGamal Signatures and Determine Secret Key. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Signature, ElGamal |
20 | Elad Barkan, Eli Biham, Adi Shamir |
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
Time/memory tradeoff, time/memory/data tradeoff, hidden state, stateful random graph, Hellman, lower bound, Cryptanalysis, rigorous, Rainbow |
20 | Joseph Bonneau, Ilya Mironov |
Cache-Collision Timing Attacks Against AES. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
cache, cryptanalysis, AES, side-channel attack, timing attack |
20 | Gildas Avoine |
Fraud Within Asymmetric Multi-hop Cellular Networks. |
Financial Cryptography |
2005 |
DBLP DOI BibTeX RDF |
multi-hop cellular networks, cryptanalysis, Micro-payment |
20 | Hirotaka Yoshida, Alex Biryukov |
Analysis of a SHA-256 Variant. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
SHA-2-XOR, SHACAL-2-XOR, Pseudo-collision resistance, Iterative patterns, Differential cryptanalysis, SHA-256 |
20 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Breaking a New Hash Function Design Strategy Called SMASH. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
SMASH, cryptanalysis, hash functions, collision |
20 | Simon Künzli 0002, Pascal Junod, Willi Meier |
Distinguishing Attacks on T-Functions. |
Mycrypt |
2005 |
DBLP DOI BibTeX RDF |
T-function, square mapping, statistical cryptanalysis, Stream cipher, distinguishing attack |
20 | Joydip Mitra |
A Near-Practical Attack Against B Mode of HBB. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
known-plaintext attack, HBB, cryptanalysis, stream cipher |
20 | Phong Q. Nguyen, Jacques Stern |
Adapting Density Attacks to Low-Weight Knapsacks. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Lattices, Knapsack, Public-Key Cryptanalysis, Subset Sum |
20 | Itsik Mantin |
A Practical Attack on the Fixed RC4 in the WEP Mode. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks |
20 | Alexander Maximov |
Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
VMPC, RC4A, linear distinguishing attack, cryptanalysis, RC4 |
20 | Alex Biryukov, Adi Shamir |
Analysis of the Non-linear Part of Mugi. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
Mugi, Cryptanalysis, Stream ciphers |
20 | Itsik Mantin |
Predicting and Distinguishing Attacks on RC4 Keystream Generator. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
Predicting attacks, Cryptanalysis, Stream ciphers, RC4, Distinguishing attacks |
20 | Thierry P. Berger, Marine Minier |
Two Algebraic Attacks Against the F-FCSRs Using the IV Mode. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
cryptanalysis, Stream cipher, algebraic attack |
20 | Manuel Barbosa, Dan Page |
On the Automatic Construction of Indistinguishable Operations. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
Indistinguishable Operations, Countermeasures, Simple Power Analysis, Side-channel Cryptanalysis |
20 | Vincent Rijmen, Elisabeth Oswald |
Update on SHA-1. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions |
20 | Wieland Fischer, Berndt M. Gammel |
Masking at Gate Level in the Presence of Glitches. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
random masking, masked logic circuits, Cryptanalysis, side-channel attacks, DPA, power analysis, logic circuits, digital circuits, masking, glitches |
20 | Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao |
A server assisted authentication protocol for detecting error vectors. |
ACM SIGOPS Oper. Syst. Rev. |
2004 |
DBLP DOI BibTeX RDF |
server assisted, cryptography, cryptanalysis, RSA |
20 | Nicolas T. Courtois |
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
polynomial relations, design of cryptographic primitives, generalised linear cryptanalysis, multivariate public key encryption and signature schemes, Quartz, combiners with memory, elimination methods, Gröbner bases, Boolean functions, stream ciphers, block ciphers, AES, finite fields, algebraic attacks, Rijndael, Serpent, HFE, Sflash, multivariate equations |
20 | Joydip Mitra, Palash Sarkar 0001 |
Time-Memory Trade-Off Attacks on Multiplications and T-Functions. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
T–functions, cryptanalysis, stream cipher, multiplication, time-memory trade-off |
20 | Bartosz Zoltak |
VMPC One-Way Function and Stream Cipher. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
lower bound, cryptanalysis, stream cipher, one-way function, RC4 |
20 | Helger Lipmaa, Johan Wallén, Philippe Dumas 0001 |
On the Additive Differential Probability of Exclusive-Or. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
Additive differential probability, differential cryptanalysis, rational series |
20 | Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
IDEA and MESH ciphers, known-plaintext attack, Cryptanalysis |
20 | Phong Q. Nguyen |
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
GnuPG, GPG, Cryptanalysis, Implementation, RSA, Public-key cryptography, ElGamal, OpenPGP |
20 | Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, JaeCheol Ha |
Improvement on Ha-Moon Randomized Exponentiation Algorithm. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
Randomized recoding, Signed-digit recoding, Side-channel attack, Differential power analysis (DPA), Simple power analysis (SPA), Modular exponentiation, Physical cryptanalysis |
20 | Françoise Levy-dit-Vehel, Ludovic Perret |
Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
Thue Systems, Finitely Presented Groups, Free Partially Commutative Monoids, Homomorphic Mappings, Word Problem, Public Key Cryptanalysis |
20 | Maneli Noorkami, Faramarz Fekri |
A Fast Correlation Attack via Unequal Error Correcting LDPC Codes. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
cryptanalysis, Stream ciphers, linear feedback shift registers, fast correlation attacks, LDPC codes |
20 | Alex Biryukov, Christophe De Cannière, Michaël Quisquater |
On Multiple Linear Approximations. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
multiple linear approximations, stochastic systems of linear equations, maximum likelihood decoding, key-ranking, AES, DES, Linear cryptanalysis |
20 | Serge Vaudenay |
Decorrelation: A Theory for Block Cipher Security. |
J. Cryptol. |
2003 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block ciphers, Pseudorandomness |
20 | Dai Watanabe, Alex Biryukov, Christophe De Cannière |
A Distinguishing Attack of SNOW 2.0 with Linear Masking Method. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Stream cipher, Linear cryptanalysis, SNOW |
20 | Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji |
Optimized Chi2-Attack against RC6. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
2-attack, Cryptanalysis, Block Cipher, RC6 |
20 | Guilin Wang, Xiaoxi Han, Bo Zhu |
On the Security of Two Threshold Signature Schemes with Traceable Signers. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, threshold signature |
20 | Nicolas T. Courtois, Magnus Daum, Patrick Felke |
On the Security of HFE, HFEv- and Quartz. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
asymmetric cryptography, multivariate cryptanalysis, Gröbner bases, Hidden Field Equation, HFE problem, Quartz, Nessie project, finite fields |
20 | Dennis Hofheinz, Rainer Steinwandt |
A Practical Attack on Some Braid Group Based Cryptographic Primitives. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, braid groups |
20 | Christian Tobias |
Security Analysis of the MOR Cryptosystem. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
MOR Cryptosystem, Finite Non Abelian Groups, Cryptanalysis, Public Key Cryptosystem, Conjugacy Problem |
20 | Johan Wallén |
Linear Approximations of Addition Modulo 2n. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
correlation, linear cryptanalysis, Linear approximations, modular addition |
20 | Chien-Ning Chen, Sung-Ming Yen |
Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
Differential fault analysis (DFA), Smart cards, AES, Rijndael, Physical cryptanalysis |
20 | Michael Szydlo |
Hypercubic Lattice Reduction and Analysis of GGH and NTRU Signatures. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Lattice Distinguishing Oracle, Distributed Lattice Reduction, Decisional Lattice Problem, Gram Matrix Factorization, Integral Lattice Embedding Orthogonal Lattice, GGH Cryptanalysis, NTRUSign, Lattice Isomorphism |
20 | Pierre-Alain Fouque, Guillaume Poupard |
On the Security of RDSA. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
DSA variant, known-message attack, cryptanalysis, GPS, Signature scheme, lattice reduction |
20 | Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson |
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Alpha1, irregular clocking, divide and conquer attack, Cryptanalysis, stream cipher |
20 | Guilin Wang |
On the Security of a Group Signature Scheme with Forward Security. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, group signature, forward security |
20 | Guilin Wang |
Security Analysis of Several Group Signature Schemes. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, group signature, forgery |
20 | Yuval Ishai, Amit Sahai, David A. Wagner 0001 |
Private Circuits: Securing Hardware against Probing Attacks. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
Cryptanalysis, provable security, side channel attacks, secure multi-party computation, circuit complexity |
20 | Philippe Chose, Antoine Joux, Michel Mitton |
Fast Correlation Attacks: An Algorithmic Point of View. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
match-and-sort, algorithmics, cryptanalysis, Stream ciphers, linear feedback shift registers, fast correlation attacks, parity-checks |
20 | Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung |
Observability Analysis - Detecting When Improved Cryptosystems Fail. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
robustness, cryptanalysis, implementations, side-channel attacks, observability, Security analysis, fault analysis, cryptosystems |
20 | Marcin Gomulkiewicz, Miroslaw Kutylowski |
Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense. |
ESORICS |
2002 |
DBLP DOI BibTeX RDF |
power analysis, side channel cryptanalysis, Hamming weight, cryptographic hardware |
20 | Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee 0002, Hyungjin Yang, Jongin Lim 0001 |
A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
CIKS-1(Cipher with Internal Key Scheduling), Block Cipher, Linear Cryptanalysis, Data-Dependent Permutation |
20 | Éliane Jaulmes, Guillaume Poupard |
On the Security of Homage Group Authentication Protocol. |
Financial Cryptography |
2001 |
DBLP BibTeX RDF |
group authentication, Anonymity, cryptanalysis |
20 | Tanja Römer, Jean-Pierre Seifert |
Information Leakage Attacks against Smart Card Implementations of the Elliptic Curve Digital Signature Algorithm. |
E-smart |
2001 |
DBLP DOI BibTeX RDF |
successive minimum, Cryptanalysis, side-channel-attacks, Lattice, ECDSA, Lattice basis reduction, LLL |
20 | Phong Q. Nguyen, Igor E. Shparlinski |
On the Insecurity of a Server-Aided RSA Protocol. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Server-aided protocol, Cryptanalysis, Lattices, RSA signature |
20 | Johannes Blömer, Alexander May 0001 |
Low Secret Exponent RSA Revisited. |
CaLC |
2001 |
DBLP DOI BibTeX RDF |
Low secret exponent RSA, Coppersmith's method, cryptanalysis, lattice reduction |
20 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Fast Correlation Attack Algorithm with List Decoding and an Application. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
nonlinear combiner, cryptanalysis, Stream ciphers, linear feedback shift registers, nonlinear filter, keystream generators |
20 | Helger Lipmaa, Shiho Moriai |
Efficient Algorithms for Computing Differential Properties of Addition. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
differential probability, maximum differential probability, differential cryptanalysis, Modular addition, impossible differentials |
20 | Kishan Chand Gupta, Subhamoy Maitra |
Multiples of Primitive Polynomials over GF(2). |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Stream Cipher, Galois Field, Primitive Polynomials, Polynomial Multiples |
20 | Volker Roth 0002 |
On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection. |
Mobile Agents |
2001 |
DBLP DOI BibTeX RDF |
breaking security protocols, cryptanalysis, mobile agent security |
20 | Karl Brincat, Chris J. Mitchell |
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
cryptographic API, cryptanalysis, Message Authentication Code |
20 | Chin-Chen Chang 0001, Kuo-Feng Hwang |
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
convertible group signature, Cryptography, cryptanalysis |
20 | Dingfeng Ye, Junhui Yang, Zongduo Dai, Haiwen Ou |
Attacks on Two Digital Signature Schemes Based on Error Correcting Codes. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, error-correcting code |
20 | Philip Hawkes, Gregory G. Rose |
Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
SOBER, t-class, SSC-II, cryptanalysis, stream ciphers |
20 | Alex Biryukov, Adi Shamir |
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
time/memory tradeoff attacks, Cryptanalysis, stream ciphers |
20 | Amr M. Youssef, Guang Gong |
On the Interpolation Attacks on Block Ciphers. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
interpolation attack, Galois Field Fourier Transform, cryptanalysis, Block cipher, finite fields |
20 | Lars R. Knudsen, Willi Meier |
Correlations in RC6 with a Reduced Number of Rounds. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Cipher, Advanced Encryption Standard, RC6 |
20 | Vladimir V. Chepyzhov, Thomas Johansson 0001, Ben J. M. Smeets |
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
cryptanalysis, Stream ciphers, correlation attacks |
20 | Eli Biham, Vladimir Furman |
Improved Impossible Differentials on Twofish. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
Twofish, cryptanalysis, impossible differential |
20 | Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell |
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Message Authentication Codes, CBC-MAC |
20 | Adi Shamir, Nicko van Someren |
Playing "Hide and Seek" with Stored Keys. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
lunchtime attacks, authenticode, key hiding, Cryptanalysis, RSA |
20 | Marc Joye, Narn-Yih Lee, Tzonelih Hwang |
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives. |
ISW |
1999 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Digital signatures, Group signatures |
20 | Paul C. Kocher, Joshua Jaffe, Benjamin Jun |
Differential Power Analysis. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
cryptanalysis, differential power analysis, DPA, DES, SPA |
20 | Adi Shamir |
Factoring Large Numbers with the Twinkle Device (Extended Abstract). |
CHES |
1999 |
DBLP DOI BibTeX RDF |
Sieving, Quadratic Sieve, Cryptanalysis, Factoring, optical computing, Number Field Sieve |
20 | Helena Handschuh, Howard M. Heys |
A Timing Attack on RC5. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Cipher, Timing Attacks |
20 | Jovan Dj. Golic, Renato Menicocci |
Correlation Attacks on Up/Down Cascades. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
clock-controlled shift registers, up/down and stop/go cascades, cryptanalysis, Stream ciphers, correlation attacks |
20 | Mark Ettinger |
Steganalysis and Game Equilibria. |
Information Hiding |
1998 |
DBLP DOI BibTeX RDF |
Active Warden Attack, Cryptanalysis, Steganalysis, Shannon Entropy, Equilibria, Binary Symmetric Channel |
20 | Thomas A. Berson |
Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
McEliece, error vectors, message-resend attack, related-message attack, protocol failure, cryptanalysis, error-correcting codes, randomization, public-key cryptosystem |
20 | Jovan Dj. Golic, Renato Menicocci |
Edit Distance Correlation Attack on the Alternating Step Generator. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
clock-controlled shift registers, alternating step generator, cryptanalysis, Stream ciphers, edit distance, correlation attacks |
Displaying result #301 - #400 of 4217 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|