The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Cryptanalysis with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1982 (17) 1983-1985 (15) 1986-1988 (18) 1989-1990 (17) 1991 (19) 1992-1993 (37) 1994 (34) 1995 (18) 1996 (26) 1997 (34) 1998 (48) 1999 (43) 2000 (56) 2001 (80) 2002 (91) 2003 (108) 2004 (113) 2005 (172) 2006 (171) 2007 (181) 2008 (222) 2009 (206) 2010 (142) 2011 (177) 2012 (171) 2013 (152) 2014 (175) 2015 (209) 2016 (205) 2017 (168) 2018 (186) 2019 (188) 2020 (158) 2021 (174) 2022 (160) 2023 (183) 2024 (43)
Publication types (Num. hits)
article(2176) book(10) incollection(26) inproceedings(1893) phdthesis(112)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2108 occurrences of 562 keywords

Results
Found 4217 publication records. Showing 4217 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17Jean-Jacques Quisquater, François-Xavier Standaert, Gaël Rouvroy, Jean-Pierre David, Jean-Didier Legat A Cryptanalytic Time-Memory Tradeoff: First FPGA Implementation. Search on Bibsonomy FPL The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Erik Zenner On the Efficiency of theClock Control Guessing Attack. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Block/Stream Ciphers, Cryptographic Primitives
17Liam Keliher, Henk Meijer, Stafford E. Tavares Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Tetsu Iwata, Tomonobu Yoshino, Tomohiro Yuasa, Kaoru Kurosawa Round Security and Super-Pseudorandomness of MISTY Type Structure. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Christophe Debaert, Henri Gilbert The RIPEMD and RIPEMD Improved Variants of MD4 Are Not Collision Free. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Anne Canteaut Cryptographic Functions and Design Criteria for Block Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Joan Daemen, Vincent Rijmen The Wide Trail Design Strategy. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Anne Canteaut, Pascale Charpin, Hans Dobbertin A New Characterization of Almost Bent Functions. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
17Jacques Patarin, Louis Goubin, Nicolas T. Courtois C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Burton S. Kaliski Jr., Yiqun Lisa Yin On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
17Daxing Li, Shaohan Ma Two Notes on Low-Density Subset Sum Algorithms. Search on Bibsonomy ISAAC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
17Kaisa Nyberg Linear Approximation of Block Ciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
17Eli Biham, Alex Biryukov An Improvement of Davies' Attack on DES. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
17Willi Meier On the Security of the IDEA Block Cipher. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
17G. Hornauer, W. Stephan, Ralph Wernsdorf Markov Ciphers and Alternating Groups. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
17Shoji Miyaguchi The FEAL-8 Cryptosystem and a Call for Attack. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
11Chin-Ling Chen, Yu-Fan Lin, Neng-Chung Wang, Young-Long Chen An Improvement on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards. Search on Bibsonomy SNPD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF security, authentication, cryptanalysis, smart card
11Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong Fault Injection Attack on A5/3. Search on Bibsonomy ISPA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF fault injection attack, a5/3, cryptanalysis, GSM
11Charles P. Pfleeger Crypto: Not Just for the Defensive Team. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Morris worm, polymorphic viruses, packers, Virut, Virtob, Conficker, cryptography, cryptanalysis, encryption, malicious code, security & privacy
11G. Praveen Kumar, Arjun Kumar Murmu, Biswas Parajuli, Prasenjit Choudhury MULET: A Multilanguage Encryption Technique. Search on Bibsonomy ITNG The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Software Localization and Cryptanalysis, Encryption, Decryption, Unicode
11Itai Dinur, Adi Shamir Generic Analysis of Small Cryptographic Leaks. Search on Bibsonomy FDTC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cube attacks, robust cube attacks, cryptanalysis, AES, side channel attacks, Serpent
11Mohamed Abo El-Fotouh, Klaus Diepold The Pushdown Attack on AES. Search on Bibsonomy SECURWARE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Pushdown Attacks, Cryptanalysis, AES
11Somitra Kumar Sanadhya, Palash Sarkar 0001 A new hash family obtained by modifying the SHA-2 family. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-2 hash family, reduced round attacks, cryptanalysis
11Dengguo Feng, Jing Xu 0002 A New Client-to-Client Password-Authenticated Key Agreement Protocol. Search on Bibsonomy IWCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Password-authenticated key agreement, cryptanalysis, provable security, cross-realm
11Riddhipratim Basu, Subhamoy Maitra, Goutam Paul 0001, Tanmoy Talukdar On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling. Search on Bibsonomy AAECC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream Cipher, Filter, Permutation, Sequence, Bias, RC4, Key Recovery
11Santanu Sarkar 0001, Subhamoy Maitra Partial Key Exposure Attack on CRT-RSA. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys
11MoonShik Lee, Daegun Ma, MinJae Seo Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF public-key traitor tracing, black-box tracing, self-defensive pirates, linear attack, cryptanalysis
11Eun-Jun Yoon, Kee-Young Yoo Robust Broadcasting Cryptosystem in Computer Networks. Search on Bibsonomy GPC Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Broadcasting cryptosystem, Cryptography, Cryptanalysis, Information security, Key management
11Chun-Ta Li, Min-Shiang Hwang Improving the Security of Non-PKI Methods for Public Key Distribution. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Cryptanalysis, PKI, X.509
11Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer Rebound Attack on the Full Lane Compression Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF LANE, rebound attack, semi-free-start collision, cryptanalysis, hash function, SHA-3
11Guilhem Castagnos, Antoine Joux, Fabien Laguillaumie, Phong Q. Nguyen Factoring pq2 with Quadratic Forms: Nice Cryptanalyses. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Factorisation, Binary Quadratic Forms, Homogeneous Coppersmith’s Root Finding, Lattices, Public-key Cryptanalysis
11Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer Rebound Distinguishers: Results on the Full Whirlpool Compression Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, distinguisher, near-collision
11Antoine Joux, Stefan Lucks Improved Generic Algorithms for 3-Collisions. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multicollision, random map, memory-efficient, cryptanalysis, parallel implementation
11Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF three-party, cryptanalysis, provable security, attacks, Weil pairing, Password-authenticated key exchange, key compromise impersonation
11Muhammad Khurram Khan Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF authentication, cryptanalysis, smart card, password
11Jongsung Kim, Raphael C.-W. Phan A Cryptanalytic View of the NSA's Skipjack Block Cipher Design. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Skipjack, NSA, Cryptanalysis, Block Ciphers, Distinguisher
11Yoshinori Aono A New Lattice Construction for Partial Key Exposure Attack for RSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF partial key exposure attack, the Coppersmith technique, cryptanalysis, RSA, lattice basis reduction
11Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater Practical Algebraic Attacks on the Hitag2 Stream Cipher. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hitag 2 algorithm, MiFare Crypto-1 cipher, Gröbner bases, Boolean functions, stream ciphers, RFID tags, SAT solvers, algebraic cryptanalysis
11S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan On the Security of Identity Based Ring Signcryption Schemes. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Ring Signcryption, Adaptive Chosen Ciphertext Attack, Cryptanalysis, Provable Security, Confidentiality, Bilinear Pairing, Random Oracle Model, Chosen Plaintext Attack
11Paul Stankovski, Martin Hell, Thomas Johansson 0001 An Efficient State Recovery Attack on X-FCSR-256. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF X-FCSR, state recovery, cryptanalysis, stream cipher, FCSR
11Itai Dinur, Adi Shamir Cube Attacks on Tweakable Black Box Polynomials. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cube attacks, tweakable black box polynomials, Cryptanalysis, stream ciphers, algebraic attacks, Trivium
11Khaled Ouafi, Serge Vaudenay Smashing SQUASH-0. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RFID, cryptanalysis, MAC
11Jean-Sébastien Coron, Ilya Kizhvatov Analysis of the split mask countermeasure for embedded systems. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, DPA, side channel analysis, countermeasures, masking
11Florian Mendel, Tomislav Nad A Distinguisher for the Compression Function of SIMD-512. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, SIMD, distinguisher, SHA-3 candidate
11Orr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF HAS-160, differential cryptanalysis, related-key rectangle attack
11Thierry P. Berger, Marine Minier, Benjamin Pousse Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, stream cipher, software design, FCSRs
11Hüseyin Demirci, Ihsan Taskin, Mustafa Çoban, Adnan Baysal Improved Meet-in-the-Middle Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, AES, Rijndael, meet-in-the-middle attack
11S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. Search on Bibsonomy ProvSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multi-Signcryption, Cryptanalysis, Provable Security, Bilinear Pairing, Signcryption, Random Oracle Model, Identity Based Cryptography
11Raphael C.-W. Phan Security of Group Key Exchange Protocols with Different Passwords. Search on Bibsonomy AINA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key indistinguishability, undetectable online dictionary attack, model, cryptanalysis, group, proof, Password-authenticated key exchange
11Raphael C.-W. Phan Security of Two Recent Constant-Round Password Authenticated Group Key Exchange Schemes. Search on Bibsonomy AINA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF model, cryptanalysis, group, proof, Password-authenticated key exchange
11Lin Yang, Meiqin Wang, Siyuan Qiao Side Channel Cube Attack on PRESENT. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cube attack, Cryptanalysis, Side channel attack, PRESENT
11Marine Minier, Raphael C.-W. Phan, Benjamin Pousse Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF known-key distinguishers, cryptanalysis, Block ciphers, Rijndael
11Zheng Yuan, Wei Wang 0035, Keting Jia, Guangwu Xu, Xiaoyun Wang 0001 New Birthday Attacks on Some MACs Based on Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MAC, AES, Distinguishing attack, Impossible differential cryptanalysis, Forgery attack, Birthday attack
11Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust Differential Cluster Analysis. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Differential Cluster Analysis, AES Hardware, Differential Power Analysis, Collision Attacks, Side-channel Cryptanalysis
11Erik Tews, Martin Beck Practical attacks against WEP and WPA. Search on Bibsonomy WISEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, 802.11, rc4, wep, wlan, wpa, tkip
11Jean-Charles Faugère, Ludovic Perret High order derivatives and decomposition of multivariate polynomials. Search on Bibsonomy ISSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF gröbner basis, multivariate cryptology, public key cryptography, cryptology, algebraic cryptanalysis, f5 algorithm
11Jean-Charles Faugère Interactions between computer algebra (Gröbner bases) and cryptology. Search on Bibsonomy ISSAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF gröbner basis, public key, cryptology, algebraic cryptanalysis, multivariate cryptography, f5 algorithm
11Haina Zhang, Lin Li, Xiaoyun Wang 0001 Fast correlation attack on stream cipher ABC v3. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ABC v3, cryptanalysis, stream cipher, fast correlation attack
11Wen Tao Zhu Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, key management, broadcast encryption, number theory, Secure multicast
11Eun-Jun Yoon, Kee-Young Yoo Two Security Problems of RFID Security Method with Ownership Transfer. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, RFID, Cryptanalysis, Forward secrecy, DoS attack
11Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou Deconstructing new cache designs for thwarting software cache-based side channel attacks. Search on Bibsonomy CSAW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF microarchitectural analysis, cryptanalysis, side-channel analysis, timing attack, cache architecture, cache attack
11Tim Güneysu, Christof Paar Breaking Legacy Banking Standards with Special-Purpose Hardware. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ANSI X9.9, Cryptanalysis, Banking, Special-Purpose Hardware
11Deepak Kumar Dalai On 3-to-1 and Power APN S-Boxes. Search on Bibsonomy SETA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF APN Function, Differential Cryptanalysis, S-box, Power Function
11Xavier Pujol, Damien Stehlé Rigorous and Efficient Short Lattice Vectors Enumeration. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SVP, lattice cryptanalysis, Lattices, numerical stability
11Eun-Jun Yoon, Kee-Young Yoo Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce. Search on Bibsonomy ICIC (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Protocol, Cryptanalysis, Key agreement, Chaotic maps, Nonce
11Petros Mol, Moti Yung Recovering NTRU Secret Key from Inversion Oracles. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NTRUEncrypt, Inversion Oracles, Universal Breaking, Public-Key Cryptanalysis
11Somitra Kumar Sanadhya, Palash Sarkar 0001 Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 family, reduced round attacks, cryptanalysis
11Subhamoy Maitra, Santanu Sarkar 0001 Revisiting Wiener's Attack - New Weak Keys in RSA. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, RSA, Factorization, Weak Keys
11Eun-Jun Yoon, Kee-Young Yoo Enhanced Three-Round Smart Card-Based Key Exchange Protocol. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Cryptography, Cryptanalysis, Smart card, Password, Key exchange
11Blandine Debraize, Louis Goubin Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF guess-and-determine attacks, stream cipher, SAT solver, algebraic cryptanalysis, self-shrinking generator, multivariate quadratic equations
11Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jean-Jacques Quisquater On the Salsa20 Core Function. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Salsa20, cryptanalysis, hash function, collision
11Eli Biham, Yaniv Carmeli Efficient Reconstruction of RC4 Keys from Internal States. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Initial Permutation, Cryptanalysis, Stream Cipher, RC4, Key Scheduling
11Hüseyin Demirci, Ali Aydin Selçuk A Meet-in-the-Middle Attack on 8-Round AES. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF meet-in-the-middle cryptanalysis, square attack, AES, Rijndael
11Subhamoy Maitra, Goutam Paul 0001 New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Key Leakage, Cryptanalysis, Stream Cipher, Bias, RC4, Keystream
11Nicolas T. Courtois, Gregory V. Bard, David A. Wagner 0001 Algebraic and Slide Attacks on KeeLoq. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unbalanced Feistel ciphers, Gröbner bases, KeeLoq, block ciphers, SAT solvers, algebraic cryptanalysis, slide attacks
11Florian Mendel, Norbert Pramstaller, Christian Rechberger A (Second) Preimage Attack on the GOST Hash Function. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, preimage attack
11Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Grain-v1, Grain-128, Related-key chosen IV attack, Cryptanalysis, Stream cipher
11Subhamoy Maitra, Goutam Paul 0001 Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream Cipher, Permutation, Fault Analysis, RC4, Keystream
11Florian Mendel, Martin Schläffer Collisions for Round-Reduced LAKE. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, collision attack
11Risto M. Hakala, Kaisa Nyberg Linear Distinguishing Attack on Shannon. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stream ciphers, linear cryptanalysis, Distinguishing attacks, Shannon
11Elena Andreeva 0001, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer Second Preimage Attacks on Dithered Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Hash Function, Dithering
11Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel A Practical Attack on KeeLoq. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF KeeLoq, cryptanalysis, block ciphers, slide attacks, meet-in-the-middle attacks
11Mete Akgün, Pinar Kavak, Hüseyin Demirci New Results on the Key Scheduling Algorithm of RC4. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Key Scheduling Algorithm, State Table, Cryptanalysis, Stream Cipher, RC4
11Somitra Kumar Sanadhya, Palash Sarkar 0001 New Collision Attacks against Up to 24-Step SHA-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 hash family, reduced round attacks, Cryptanalysis
11Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim New Impossible Differential Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES, Impossible differential cryptanalysis
11Deike Priemuth-Schmid, Alex Biryukov Slid Pairs in Salsa20 and Trivium. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Salsa20, cryptanalysis, stream ciphers, eSTREAM, Trivium
11Michael Gorski, Stefan Lucks New Related-Key Boomerang Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF related-key boomerang attack, block ciphers, AES, differential cryptanalysis
11Subhamoy Maitra, Santanu Sarkar 0001 A New Class of Weak Encryption Exponents in RSA. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Lattice, Factorization, LLL Algorithm
11Andrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multiple-differential collision attacks, ternary voting, AES, Side-channel attacks, DPA, collision attacks, algebraic cryptanalysis
11Dmitry Khovratovich Two Attacks on RadioGatún. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sponge, cryptanalysis, hash functions
11Amparo Fúster-Sabater, Pino Caballero-Gil Cryptanalytic Attack on Cryptographic Sequence Generators: The Class of Clock-Controlled Shrinking Generators. Search on Bibsonomy ICCSA (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF interleaved sequence, cryptanalysis, Keystream generator, shrinking generator
11Marco Baldi, Marco Bodrato, Franco Chiaraluce A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF QC-LDPC codes, Toom-Cook, Winograd, Cryptanalysis, McEliece cryptosystem
11Mohammad Ali Orumiehchiha, S. Fahimeh Mohebbipoor Distinguishing Attack on SN3 Stream Cipher. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SN3 Stream cipher, Cryptanalysis, Distinguishing Attack
11Abderrahmane Nitaj Another Generalization of Wiener's Attack on RSA. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Coppersmith’s method, Smooth numbers, Cryptanalysis, RSA, ECM
11Christophe De Cannière, Christian Rechberger Preimages for Reduced SHA-0 and SHA-1. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF directed random graph, cryptanalysis, hash function, SHA-1, preimages, SHA-0
11Nicolas T. Courtois, Blandine Debraize Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0.. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Snow 2.0, stream ciphers, algebraic immunity, algebraic cryptanalysis, Modular addition, multivariate quadratic equations
11Yossef Oren, Adi Shamir Remote Password Extraction from RFID Tags. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF sidechannel attacks, RFID, cryptanalysis, power analysis
11Dengguo Feng, Chuankun Wu Advances in cryptography and information security - introduction of 2002-2006 progress of SKLOIS. Search on Bibsonomy Frontiers Comput. Sci. China The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication and authorization, cryptography, network security, cryptanalysis
11Goutam Paul 0001, Subhamoy Maitra Permutation After RC4 Key Scheduling Reveals the Secret Key. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream Cipher, Permutation, Bias, RC4, Key Scheduling
11Håvard Raddum MRHS Equation Systems. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF non-linear equation systems, cryptanalysis, DES, algebraic attacks
Displaying result #501 - #600 of 4217 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license