The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Cryptanalysis with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1982 (17) 1983-1985 (15) 1986-1988 (18) 1989-1990 (17) 1991 (19) 1992-1993 (37) 1994 (34) 1995 (18) 1996 (26) 1997 (34) 1998 (48) 1999 (43) 2000 (56) 2001 (80) 2002 (91) 2003 (108) 2004 (113) 2005 (172) 2006 (171) 2007 (181) 2008 (222) 2009 (206) 2010 (142) 2011 (177) 2012 (171) 2013 (152) 2014 (175) 2015 (209) 2016 (205) 2017 (168) 2018 (186) 2019 (188) 2020 (158) 2021 (174) 2022 (160) 2023 (183) 2024 (43)
Publication types (Num. hits)
article(2176) book(10) incollection(26) inproceedings(1893) phdthesis(112)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2108 occurrences of 562 keywords

Results
Found 4217 publication records. Showing 4217 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Eun-Jun Yoon, Kee-Young Yoo Two Security Problems of Efficient Remote Mutual Authentication and Key Agreement. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Cryptanalysis, Smart card, Password, Key agreement
20Markku-Juhani Olavi Saarinen A Meet-in-the-Middle Collision Attack Against the New FORK-256. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FORK-256, Hash Function Cryptanalysis, Meet-in-the-middle Attack
20Wentao Zhang, Lei Zhang 0012, Wenling Wu, Dengguo Feng Related-Key Differential-Linear Attacks on Reduced AES-192. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF related-key, differential-linear attack, cryptanalysis, AES
20Mario Lamberger, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Second Preimages for SMASH. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SMASH, cryptanalysis, hash functions, second preimages
20Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, stream cipher, random walks, expander graph
20Kerstin Lemke-Rust, Christof Paar Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Boolean Masking, Multivariate Side Channel Analysis, Higher-Order Side Channel Analysis, Stochastic Methods, Side Channel Cryptanalysis
20Christian Rechberger, Vincent Rijmen, Nicolas Sklavos 0001 The NIST Cryptographic Workshop on Hash Functions. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, cryptanalysis, hash functions, SHA-1
20David Galindo, Paz Morillo, Carla Ràfols Breaking Yum and Lee Generic Constructions of Certificate-Less and Certificate-Based Encryption Schemes. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF certificate-based and certificate-less encryption, cryptanalysis, public-key infrastructure, identity-based encryption
20Goce Jakimoski Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multicast stream authentication, cryptanalysis, block ciphers, message authentication, related-key attacks, TESLA
20Tor Helleseth, Cees J. A. Jansen, Shahram Khazaei, Alexander Kholosha Security of Jump Controlled Sequence Generators for Stream Ciphers. Search on Bibsonomy SETA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF jump register, key-stream generator, linear relations, Cryptanalysis, stream cipher, Pomaranch
20Ellen Jochemsz, Alexander May 0001 A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF small roots, Coppersmith’s method, RSA variants, cryptanalysis, lattices
20Nele Mentens, Lejla Batina, Bart Preneel, Ingrid Verbauwhede Time-Memory Trade-Off Attack on FPGA Platforms: UNIX Password Cracking. Search on Bibsonomy ARC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF exhaustive key search, cryptanalysis, hash-functions, FPGA implementation, time-memory trade-off, rainbow table
20Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman Related-Key Rectangle Attack on 42-Round SHACAL-2. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SHACAL-2, Block cipher, Differential cryptanalysis, Related-key rectangle attack
20Ellen Jochemsz, Benne de Weger A Partial Key Exposure Attack on RSA Using a 2-Dimensional Lattice. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF partial key exposure, inhomogeneous diophantine approximation, cryptanalysis, RSA, lattice basis reduction
20Matthias Krause 0001, Dirk Stegemann Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bluetooth E0, GSM A5/1, cryptanalysis, Stream cipher, BDD, self-shrinking generator
20Hongjun Wu 0001, Bart Preneel Resynchronization Attacks on WG and LEX. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF resynchronization attack, WG, cryptanalysis, stream cipher, differential attack, LEX, slide attack
20Jonathan J. Hoch, Adi Shamir Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF iterated hash functions, tree based hash functions, multicollisions, cryptanalysis, Hash functions
20Jean-Charles Faugère, Ludovic Perret Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Isomorphism of Polynomials (IP), Gröbner bases, Cryptanalysis, Public-Key Cryptography, F5 algorithm
20Michele Boreale Attacking Right-to-Left Modular Exponentiation with Timely Random Faults. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fault-based cryptanalysis, public-key cryptosystems, smartcards
20Hong-Su Cho, Sangwoo Park, Soo Hak Sung, Aaram Yun Collision Search Attack for 53-Step HAS-160. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF collision search attack, HAS-160, cryptanalysis, hash function
20Sourav Mukhopadhyay, Palash Sarkar 0001 On the Effectiveness of TMTO and Exhaustive Search Attacks. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalysis, one-way function
20Baocang Wang, Yupu Hu Diophantine Approximation Attack on a Fast Public Key Cryptosystem. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Simultaneous Diophantine approximation problem, Cryptanalysis, Public-key cryptosystem, Lattice basis reduction, Diophantine approximation
20Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman Differential and Rectangle Attacks on Reduced-Round SHACAL-1. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SHACAL-1, Amplified boomerang attack, Block cipher, Differential cryptanalysis, Rectangle attack
20Marc P. C. Fossorier, Miodrag J. Mihaljevic, Hideki Imai, Yang Cui 0001, Kanta Matsuura An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF LPN problem, HB protocols, RFID authentication, cryptanalysis, fast correlation attacks
20Eun-Jun Yoon, Kee-Young Yoo An Improved Popescu's Authenticated Key Agreement Protocol. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Cryptography, Cryptanalysis, Elliptic curve cryptosystems, Key agreement
20Jiqiang Lu, Changhoon Lee, Jongsung Kim Related-Key Attacks on the Full-Round Cobra-F64a and Cobra-F64b. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cobra-F64a, Cobra-F64b, Block cipher, Differential cryptanalysis, Related-key attacks, Data-dependent permutation
20Jingmei Liu, Xiangguo Cheng, Xinmei Wang Methods to Forge ElGamal Signatures and Determine Secret Key. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Signature, ElGamal
20Elad Barkan, Eli Biham, Adi Shamir Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Time/memory tradeoff, time/memory/data tradeoff, hidden state, stateful random graph, Hellman, lower bound, Cryptanalysis, rigorous, Rainbow
20Joseph Bonneau, Ilya Mironov Cache-Collision Timing Attacks Against AES. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache, cryptanalysis, AES, side-channel attack, timing attack
20Gildas Avoine Fraud Within Asymmetric Multi-hop Cellular Networks. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multi-hop cellular networks, cryptanalysis, Micro-payment
20Hirotaka Yoshida, Alex Biryukov Analysis of a SHA-256 Variant. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SHA-2-XOR, SHACAL-2-XOR, Pseudo-collision resistance, Iterative patterns, Differential cryptanalysis, SHA-256
20Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Breaking a New Hash Function Design Strategy Called SMASH. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SMASH, cryptanalysis, hash functions, collision
20Simon Künzli 0002, Pascal Junod, Willi Meier Distinguishing Attacks on T-Functions. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF T-function, square mapping, statistical cryptanalysis, Stream cipher, distinguishing attack
20Joydip Mitra A Near-Practical Attack Against B Mode of HBB. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF known-plaintext attack, HBB, cryptanalysis, stream cipher
20Phong Q. Nguyen, Jacques Stern Adapting Density Attacks to Low-Weight Knapsacks. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Lattices, Knapsack, Public-Key Cryptanalysis, Subset Sum
20Itsik Mantin A Practical Attack on the Fixed RC4 in the WEP Mode. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks
20Alexander Maximov Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF VMPC, RC4A, linear distinguishing attack, cryptanalysis, RC4
20Alex Biryukov, Adi Shamir Analysis of the Non-linear Part of Mugi. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Mugi, Cryptanalysis, Stream ciphers
20Itsik Mantin Predicting and Distinguishing Attacks on RC4 Keystream Generator. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Predicting attacks, Cryptanalysis, Stream ciphers, RC4, Distinguishing attacks
20Thierry P. Berger, Marine Minier Two Algebraic Attacks Against the F-FCSRs Using the IV Mode. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptanalysis, Stream cipher, algebraic attack
20Manuel Barbosa, Dan Page On the Automatic Construction of Indistinguishable Operations. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Indistinguishable Operations, Countermeasures, Simple Power Analysis, Side-channel Cryptanalysis
20Vincent Rijmen, Elisabeth Oswald Update on SHA-1. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions
20Wieland Fischer, Berndt M. Gammel Masking at Gate Level in the Presence of Glitches. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF random masking, masked logic circuits, Cryptanalysis, side-channel attacks, DPA, power analysis, logic circuits, digital circuits, masking, glitches
20Cheng-Chi Lee, Min-Shiang Hwang, I-En Liao A server assisted authentication protocol for detecting error vectors. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF server assisted, cryptography, cryptanalysis, RSA
20Nicolas T. Courtois General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF polynomial relations, design of cryptographic primitives, generalised linear cryptanalysis, multivariate public key encryption and signature schemes, Quartz, combiners with memory, elimination methods, Gröbner bases, Boolean functions, stream ciphers, block ciphers, AES, finite fields, algebraic attacks, Rijndael, Serpent, HFE, Sflash, multivariate equations
20Joydip Mitra, Palash Sarkar 0001 Time-Memory Trade-Off Attacks on Multiplications and T-Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF T–functions, cryptanalysis, stream cipher, multiplication, time-memory trade-off
20Bartosz Zoltak VMPC One-Way Function and Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF lower bound, cryptanalysis, stream cipher, one-way function, RC4
20Helger Lipmaa, Johan Wallén, Philippe Dumas 0001 On the Additive Differential Probability of Exclusive-Or. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Additive differential probability, differential cryptanalysis, rational series
20Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IDEA and MESH ciphers, known-plaintext attack, Cryptanalysis
20Phong Q. Nguyen Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF GnuPG, GPG, Cryptanalysis, Implementation, RSA, Public-key cryptography, ElGamal, OpenPGP
20Sung-Ming Yen, Chien-Ning Chen, Sang-Jae Moon, JaeCheol Ha Improvement on Ha-Moon Randomized Exponentiation Algorithm. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Randomized recoding, Signed-digit recoding, Side-channel attack, Differential power analysis (DPA), Simple power analysis (SPA), Modular exponentiation, Physical cryptanalysis
20Françoise Levy-dit-Vehel, Ludovic Perret Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Thue Systems, Finitely Presented Groups, Free Partially Commutative Monoids, Homomorphic Mappings, Word Problem, Public Key Cryptanalysis
20Maneli Noorkami, Faramarz Fekri A Fast Correlation Attack via Unequal Error Correcting LDPC Codes. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptanalysis, Stream ciphers, linear feedback shift registers, fast correlation attacks, LDPC codes
20Alex Biryukov, Christophe De Cannière, Michaël Quisquater On Multiple Linear Approximations. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF multiple linear approximations, stochastic systems of linear equations, maximum likelihood decoding, key-ranking, AES, DES, Linear cryptanalysis
20Serge Vaudenay Decorrelation: A Theory for Block Cipher Security. Search on Bibsonomy J. Cryptol. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block ciphers, Pseudorandomness
20Dai Watanabe, Alex Biryukov, Christophe De Cannière A Distinguishing Attack of SNOW 2.0 with Linear Masking Method. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Stream cipher, Linear cryptanalysis, SNOW
20Norihisa Isogai, Takashi Matsunaka, Atsuko Miyaji Optimized Chi2-Attack against RC6. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF 2-attack, Cryptanalysis, Block Cipher, RC6
20Guilin Wang, Xiaoxi Han, Bo Zhu On the Security of Two Threshold Signature Schemes with Traceable Signers. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, digital signature, threshold signature
20Nicolas T. Courtois, Magnus Daum, Patrick Felke On the Security of HFE, HFEv- and Quartz. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF asymmetric cryptography, multivariate cryptanalysis, Gröbner bases, Hidden Field Equation, HFE problem, Quartz, Nessie project, finite fields
20Dennis Hofheinz, Rainer Steinwandt A Practical Attack on Some Braid Group Based Cryptographic Primitives. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, braid groups
20Christian Tobias Security Analysis of the MOR Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF MOR Cryptosystem, Finite Non Abelian Groups, Cryptanalysis, Public Key Cryptosystem, Conjugacy Problem
20Johan Wallén Linear Approximations of Addition Modulo 2n. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF correlation, linear cryptanalysis, Linear approximations, modular addition
20Chien-Ning Chen, Sung-Ming Yen Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Differential fault analysis (DFA), Smart cards, AES, Rijndael, Physical cryptanalysis
20Michael Szydlo Hypercubic Lattice Reduction and Analysis of GGH and NTRU Signatures. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Lattice Distinguishing Oracle, Distributed Lattice Reduction, Decisional Lattice Problem, Gram Matrix Factorization, Integral Lattice Embedding Orthogonal Lattice, GGH Cryptanalysis, NTRUSign, Lattice Isomorphism
20Pierre-Alain Fouque, Guillaume Poupard On the Security of RDSA. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF DSA variant, known-message attack, cryptanalysis, GPS, Signature scheme, lattice reduction
20Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Alpha1, irregular clocking, divide and conquer attack, Cryptanalysis, stream cipher
20Guilin Wang On the Security of a Group Signature Scheme with Forward Security. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, digital signature, group signature, forward security
20Guilin Wang Security Analysis of Several Group Signature Schemes. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, digital signature, group signature, forgery
20Yuval Ishai, Amit Sahai, David A. Wagner 0001 Private Circuits: Securing Hardware against Probing Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cryptanalysis, provable security, side channel attacks, secure multi-party computation, circuit complexity
20Philippe Chose, Antoine Joux, Michel Mitton Fast Correlation Attacks: An Algorithmic Point of View. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF match-and-sort, algorithmics, cryptanalysis, Stream ciphers, linear feedback shift registers, fast correlation attacks, parity-checks
20Marc Joye, Jean-Jacques Quisquater, Sung-Ming Yen, Moti Yung Observability Analysis - Detecting When Improved Cryptosystems Fail. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF robustness, cryptanalysis, implementations, side-channel attacks, observability, Security analysis, fault analysis, cryptosystems
20Marcin Gomulkiewicz, Miroslaw Kutylowski Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense. Search on Bibsonomy ESORICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF power analysis, side channel cryptanalysis, Hamming weight, cryptographic hardware
20Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee 0002, Hyungjin Yang, Jongin Lim 0001 A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF CIKS-1(Cipher with Internal Key Scheduling), Block Cipher, Linear Cryptanalysis, Data-Dependent Permutation
20Éliane Jaulmes, Guillaume Poupard On the Security of Homage Group Authentication Protocol. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF group authentication, Anonymity, cryptanalysis
20Tanja Römer, Jean-Pierre Seifert Information Leakage Attacks against Smart Card Implementations of the Elliptic Curve Digital Signature Algorithm. Search on Bibsonomy E-smart The full citation details ... 2001 DBLP  DOI  BibTeX  RDF successive minimum, Cryptanalysis, side-channel-attacks, Lattice, ECDSA, Lattice basis reduction, LLL
20Phong Q. Nguyen, Igor E. Shparlinski On the Insecurity of a Server-Aided RSA Protocol. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Server-aided protocol, Cryptanalysis, Lattices, RSA signature
20Johannes Blömer, Alexander May 0001 Low Secret Exponent RSA Revisited. Search on Bibsonomy CaLC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Low secret exponent RSA, Coppersmith's method, cryptanalysis, lattice reduction
20Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Fast Correlation Attack Algorithm with List Decoding and an Application. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF nonlinear combiner, cryptanalysis, Stream ciphers, linear feedback shift registers, nonlinear filter, keystream generators
20Helger Lipmaa, Shiho Moriai Efficient Algorithms for Computing Differential Properties of Addition. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF differential probability, maximum differential probability, differential cryptanalysis, Modular addition, impossible differentials
20Kishan Chand Gupta, Subhamoy Maitra Multiples of Primitive Polynomials over GF(2). Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream Cipher, Galois Field, Primitive Polynomials, Polynomial Multiples
20Volker Roth 0002 On the Robustness of Some Cryptographic Protocols for Mobile Agent Protection. Search on Bibsonomy Mobile Agents The full citation details ... 2001 DBLP  DOI  BibTeX  RDF breaking security protocols, cryptanalysis, mobile agent security
20Karl Brincat, Chris J. Mitchell Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF cryptographic API, cryptanalysis, Message Authentication Code
20Chin-Chen Chang 0001, Kuo-Feng Hwang Towards the Forgery of a Group Signature without Knowing the Group Center's Secret. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF convertible group signature, Cryptography, cryptanalysis
20Dingfeng Ye, Junhui Yang, Zongduo Dai, Haiwen Ou Attacks on Two Digital Signature Schemes Based on Error Correcting Codes. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF cryptanalysis, digital signature, error-correcting code
20Philip Hawkes, Gregory G. Rose Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF SOBER, t-class, SSC-II, cryptanalysis, stream ciphers
20Alex Biryukov, Adi Shamir Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF time/memory tradeoff attacks, Cryptanalysis, stream ciphers
20Amr M. Youssef, Guang Gong On the Interpolation Attacks on Block Ciphers. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF interpolation attack, Galois Field Fourier Transform, cryptanalysis, Block cipher, finite fields
20Lars R. Knudsen, Willi Meier Correlations in RC6 with a Reduced Number of Rounds. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Cipher, Advanced Encryption Standard, RC6
20Vladimir V. Chepyzhov, Thomas Johansson 0001, Ben J. M. Smeets A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF cryptanalysis, Stream ciphers, correlation attacks
20Eli Biham, Vladimir Furman Improved Impossible Differentials on Twofish. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Twofish, cryptanalysis, impossible differential
20Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Cryptanalysis, Message Authentication Codes, CBC-MAC
20Adi Shamir, Nicko van Someren Playing "Hide and Seek" with Stored Keys. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF lunchtime attacks, authenticode, key hiding, Cryptanalysis, RSA
20Marc Joye, Narn-Yih Lee, Tzonelih Hwang On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Cryptanalysis, Digital signatures, Group signatures
20Paul C. Kocher, Joshua Jaffe, Benjamin Jun Differential Power Analysis. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF cryptanalysis, differential power analysis, DPA, DES, SPA
20Adi Shamir Factoring Large Numbers with the Twinkle Device (Extended Abstract). Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Sieving, Quadratic Sieve, Cryptanalysis, Factoring, optical computing, Number Field Sieve
20Helena Handschuh, Howard M. Heys A Timing Attack on RC5. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Cipher, Timing Attacks
20Jovan Dj. Golic, Renato Menicocci Correlation Attacks on Up/Down Cascades. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF clock-controlled shift registers, up/down and stop/go cascades, cryptanalysis, Stream ciphers, correlation attacks
20Mark Ettinger Steganalysis and Game Equilibria. Search on Bibsonomy Information Hiding The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Active Warden Attack, Cryptanalysis, Steganalysis, Shannon Entropy, Equilibria, Binary Symmetric Channel
20Thomas A. Berson Failure of the McEliece Public-Key Cryptosystem Under Message-Resend and Related-Message Attack. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF McEliece, error vectors, message-resend attack, related-message attack, protocol failure, cryptanalysis, error-correcting codes, randomization, public-key cryptosystem
20Jovan Dj. Golic, Renato Menicocci Edit Distance Correlation Attack on the Alternating Step Generator. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF clock-controlled shift registers, alternating step generator, cryptanalysis, Stream ciphers, edit distance, correlation attacks
Displaying result #301 - #400 of 4217 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license