|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2108 occurrences of 562 keywords
|
|
|
Results
Found 4217 publication records. Showing 4217 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
17 | Jean-Jacques Quisquater, François-Xavier Standaert, Gaël Rouvroy, Jean-Pierre David, Jean-Didier Legat |
A Cryptanalytic Time-Memory Tradeoff: First FPGA Implementation. |
FPL |
2002 |
DBLP DOI BibTeX RDF |
|
17 | Erik Zenner |
On the Efficiency of theClock Control Guessing Attack. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
Block/Stream Ciphers, Cryptographic Primitives |
17 | Liam Keliher, Henk Meijer, Stafford E. Tavares |
Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Tetsu Iwata, Tomonobu Yoshino, Tomohiro Yuasa, Kaoru Kurosawa |
Round Security and Super-Pseudorandomness of MISTY Type Structure. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Christophe Debaert, Henri Gilbert |
The RIPEMD and RIPEMD Improved Variants of MD4 Are Not Collision Free. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Anne Canteaut |
Cryptographic Functions and Design Criteria for Block Ciphers. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Joan Daemen, Vincent Rijmen |
The Wide Trail Design Strategy. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
|
17 | Anne Canteaut, Pascale Charpin, Hans Dobbertin |
A New Characterization of Almost Bent Functions. |
FSE |
1999 |
DBLP DOI BibTeX RDF |
|
17 | Jacques Patarin, Louis Goubin, Nicolas T. Courtois |
C*-+ and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
17 | Burton S. Kaliski Jr., Yiqun Lisa Yin |
On Differential and Linear Crytoanalysis of the RC5 Encryption Algorithm. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
17 | Daxing Li, Shaohan Ma |
Two Notes on Low-Density Subset Sum Algorithms. |
ISAAC |
1994 |
DBLP DOI BibTeX RDF |
|
17 | Kaisa Nyberg |
Linear Approximation of Block Ciphers. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
17 | Eli Biham, Alex Biryukov |
An Improvement of Davies' Attack on DES. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
17 | Willi Meier |
On the Security of the IDEA Block Cipher. |
EUROCRYPT |
1993 |
DBLP DOI BibTeX RDF |
|
17 | G. Hornauer, W. Stephan, Ralph Wernsdorf |
Markov Ciphers and Alternating Groups. |
EUROCRYPT |
1993 |
DBLP DOI BibTeX RDF |
|
17 | Shoji Miyaguchi |
The FEAL-8 Cryptosystem and a Call for Attack. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
11 | Chin-Ling Chen, Yu-Fan Lin, Neng-Chung Wang, Young-Long Chen |
An Improvement on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards. |
SNPD |
2011 |
DBLP DOI BibTeX RDF |
security, authentication, cryptanalysis, smart card |
11 | Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong |
Fault Injection Attack on A5/3. |
ISPA |
2011 |
DBLP DOI BibTeX RDF |
fault injection attack, a5/3, cryptanalysis, GSM |
11 | Charles P. Pfleeger |
Crypto: Not Just for the Defensive Team. |
IEEE Secur. Priv. |
2010 |
DBLP DOI BibTeX RDF |
Morris worm, polymorphic viruses, packers, Virut, Virtob, Conficker, cryptography, cryptanalysis, encryption, malicious code, security & privacy |
11 | G. Praveen Kumar, Arjun Kumar Murmu, Biswas Parajuli, Prasenjit Choudhury |
MULET: A Multilanguage Encryption Technique. |
ITNG |
2010 |
DBLP DOI BibTeX RDF |
Software Localization and Cryptanalysis, Encryption, Decryption, Unicode |
11 | Itai Dinur, Adi Shamir |
Generic Analysis of Small Cryptographic Leaks. |
FDTC |
2010 |
DBLP DOI BibTeX RDF |
cube attacks, robust cube attacks, cryptanalysis, AES, side channel attacks, Serpent |
11 | Mohamed Abo El-Fotouh, Klaus Diepold |
The Pushdown Attack on AES. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Pushdown Attacks, Cryptanalysis, AES |
11 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
A new hash family obtained by modifying the SHA-2 family. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
SHA-2 hash family, reduced round attacks, cryptanalysis |
11 | Dengguo Feng, Jing Xu 0002 |
A New Client-to-Client Password-Authenticated Key Agreement Protocol. |
IWCC |
2009 |
DBLP DOI BibTeX RDF |
Password-authenticated key agreement, cryptanalysis, provable security, cross-realm |
11 | Riddhipratim Basu, Subhamoy Maitra, Goutam Paul 0001, Tanmoy Talukdar |
On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling. |
AAECC |
2009 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Stream Cipher, Filter, Permutation, Sequence, Bias, RC4, Key Recovery |
11 | Santanu Sarkar 0001, Subhamoy Maitra |
Partial Key Exposure Attack on CRT-RSA. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
CRT-RSA, Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys |
11 | MoonShik Lee, Daegun Ma, MinJae Seo |
Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size. |
ACNS |
2009 |
DBLP DOI BibTeX RDF |
public-key traitor tracing, black-box tracing, self-defensive pirates, linear attack, cryptanalysis |
11 | Eun-Jun Yoon, Kee-Young Yoo |
Robust Broadcasting Cryptosystem in Computer Networks. |
GPC Workshops |
2009 |
DBLP DOI BibTeX RDF |
Broadcasting cryptosystem, Cryptography, Cryptanalysis, Information security, Key management |
11 | Chun-Ta Li, Min-Shiang Hwang |
Improving the Security of Non-PKI Methods for Public Key Distribution. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
Security, Cryptanalysis, PKI, X.509 |
11 | Krystian Matusiewicz, María Naya-Plasencia, Ivica Nikolic, Yu Sasaki, Martin Schläffer |
Rebound Attack on the Full Lane Compression Function. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
LANE, rebound attack, semi-free-start collision, cryptanalysis, hash function, SHA-3 |
11 | Guilhem Castagnos, Antoine Joux, Fabien Laguillaumie, Phong Q. Nguyen |
Factoring pq2 with Quadratic Forms: Nice Cryptanalyses. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Factorisation, Binary Quadratic Forms, Homogeneous Coppersmith’s Root Finding, Lattices, Public-key Cryptanalysis |
11 | Mario Lamberger, Florian Mendel, Christian Rechberger, Vincent Rijmen, Martin Schläffer |
Rebound Distinguishers: Results on the Full Whirlpool Compression Function. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, distinguisher, near-collision |
11 | Antoine Joux, Stefan Lucks |
Improved Generic Algorithms for 3-Collisions. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
multicollision, random map, memory-efficient, cryptanalysis, parallel implementation |
11 | Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi |
Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
three-party, cryptanalysis, provable security, attacks, Weil pairing, Password-authenticated key exchange, key compromise impersonation |
11 | Muhammad Khurram Khan |
Enhancing the Security of a 'More Efficient & Secure Dynamic ID-Based Remote User Authentication Scheme'. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
authentication, cryptanalysis, smart card, password |
11 | Jongsung Kim, Raphael C.-W. Phan |
A Cryptanalytic View of the NSA's Skipjack Block Cipher Design. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Skipjack, NSA, Cryptanalysis, Block Ciphers, Distinguisher |
11 | Yoshinori Aono |
A New Lattice Construction for Partial Key Exposure Attack for RSA. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
partial key exposure attack, the Coppersmith technique, cryptanalysis, RSA, lattice basis reduction |
11 | Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater |
Practical Algebraic Attacks on the Hitag2 Stream Cipher. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Hitag 2 algorithm, MiFare Crypto-1 cipher, Gröbner bases, Boolean functions, stream ciphers, RFID tags, SAT solvers, algebraic cryptanalysis |
11 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
On the Security of Identity Based Ring Signcryption Schemes. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Ring Signcryption, Adaptive Chosen Ciphertext Attack, Cryptanalysis, Provable Security, Confidentiality, Bilinear Pairing, Random Oracle Model, Chosen Plaintext Attack |
11 | Paul Stankovski, Martin Hell, Thomas Johansson 0001 |
An Efficient State Recovery Attack on X-FCSR-256. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
X-FCSR, state recovery, cryptanalysis, stream cipher, FCSR |
11 | Itai Dinur, Adi Shamir |
Cube Attacks on Tweakable Black Box Polynomials. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
cube attacks, tweakable black box polynomials, Cryptanalysis, stream ciphers, algebraic attacks, Trivium |
11 | Khaled Ouafi, Serge Vaudenay |
Smashing SQUASH-0. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
RFID, cryptanalysis, MAC |
11 | Jean-Sébastien Coron, Ilya Kizhvatov |
Analysis of the split mask countermeasure for embedded systems. |
WESS |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, DPA, side channel analysis, countermeasures, masking |
11 | Florian Mendel, Tomislav Nad |
A Distinguisher for the Compression Function of SIMD-512. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, SIMD, distinguisher, SHA-3 candidate |
11 | Orr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks |
Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
HAS-160, differential cryptanalysis, related-key rectangle attack |
11 | Thierry P. Berger, Marine Minier, Benjamin Pousse |
Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, stream cipher, software design, FCSRs |
11 | Hüseyin Demirci, Ihsan Taskin, Mustafa Çoban, Adnan Baysal |
Improved Meet-in-the-Middle Attacks on AES. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, AES, Rijndael, meet-in-the-middle attack |
11 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Breaking and Fixing of an Identity Based Multi-Signcryption Scheme. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
Multi-Signcryption, Cryptanalysis, Provable Security, Bilinear Pairing, Signcryption, Random Oracle Model, Identity Based Cryptography |
11 | Raphael C.-W. Phan |
Security of Group Key Exchange Protocols with Different Passwords. |
AINA Workshops |
2009 |
DBLP DOI BibTeX RDF |
key indistinguishability, undetectable online dictionary attack, model, cryptanalysis, group, proof, Password-authenticated key exchange |
11 | Raphael C.-W. Phan |
Security of Two Recent Constant-Round Password Authenticated Group Key Exchange Schemes. |
AINA Workshops |
2009 |
DBLP DOI BibTeX RDF |
model, cryptanalysis, group, proof, Password-authenticated key exchange |
11 | Lin Yang, Meiqin Wang, Siyuan Qiao |
Side Channel Cube Attack on PRESENT. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Cube attack, Cryptanalysis, Side channel attack, PRESENT |
11 | Marine Minier, Raphael C.-W. Phan, Benjamin Pousse |
Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
known-key distinguishers, cryptanalysis, Block ciphers, Rijndael |
11 | Zheng Yuan, Wei Wang 0035, Keting Jia, Guangwu Xu, Xiaoyun Wang 0001 |
New Birthday Attacks on Some MACs Based on Block Ciphers. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
MAC, AES, Distinguishing attack, Impossible differential cryptanalysis, Forgery attack, Birthday attack |
11 | Lejla Batina, Benedikt Gierlichs, Kerstin Lemke-Rust |
Differential Cluster Analysis. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
Differential Cluster Analysis, AES Hardware, Differential Power Analysis, Collision Attacks, Side-channel Cryptanalysis |
11 | Erik Tews, Martin Beck |
Practical attacks against WEP and WPA. |
WISEC |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, 802.11, rc4, wep, wlan, wpa, tkip |
11 | Jean-Charles Faugère, Ludovic Perret |
High order derivatives and decomposition of multivariate polynomials. |
ISSAC |
2009 |
DBLP DOI BibTeX RDF |
gröbner basis, multivariate cryptology, public key cryptography, cryptology, algebraic cryptanalysis, f5 algorithm |
11 | Jean-Charles Faugère |
Interactions between computer algebra (Gröbner bases) and cryptology. |
ISSAC |
2009 |
DBLP DOI BibTeX RDF |
gröbner basis, public key, cryptology, algebraic cryptanalysis, multivariate cryptography, f5 algorithm |
11 | Haina Zhang, Lin Li, Xiaoyun Wang 0001 |
Fast correlation attack on stream cipher ABC v3. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
ABC v3, cryptanalysis, stream cipher, fast correlation attack |
11 | Wen Tao Zhu |
Analyzing Euler-Fermat Theorem Based Multicast Key Distribution Schemes with Chinese Remainder Theorem. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, key management, broadcast encryption, number theory, Secure multicast |
11 | Eun-Jun Yoon, Kee-Young Yoo |
Two Security Problems of RFID Security Method with Ownership Transfer. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
Authentication, RFID, Cryptanalysis, Forward secrecy, DoS attack |
11 | Jingfei Kong, Onur Aciiçmez, Jean-Pierre Seifert, Huiyang Zhou |
Deconstructing new cache designs for thwarting software cache-based side channel attacks. |
CSAW |
2008 |
DBLP DOI BibTeX RDF |
microarchitectural analysis, cryptanalysis, side-channel analysis, timing attack, cache architecture, cache attack |
11 | Tim Güneysu, Christof Paar |
Breaking Legacy Banking Standards with Special-Purpose Hardware. |
Financial Cryptography |
2008 |
DBLP DOI BibTeX RDF |
ANSI X9.9, Cryptanalysis, Banking, Special-Purpose Hardware |
11 | Deepak Kumar Dalai |
On 3-to-1 and Power APN S-Boxes. |
SETA |
2008 |
DBLP DOI BibTeX RDF |
APN Function, Differential Cryptanalysis, S-box, Power Function |
11 | Xavier Pujol, Damien Stehlé |
Rigorous and Efficient Short Lattice Vectors Enumeration. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
SVP, lattice cryptanalysis, Lattices, numerical stability |
11 | Eun-Jun Yoon, Kee-Young Yoo |
Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce. |
ICIC (3) |
2008 |
DBLP DOI BibTeX RDF |
Protocol, Cryptanalysis, Key agreement, Chaotic maps, Nonce |
11 | Petros Mol, Moti Yung |
Recovering NTRU Secret Key from Inversion Oracles. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
NTRUEncrypt, Inversion Oracles, Universal Breaking, Public-Key Cryptanalysis |
11 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 family, reduced round attacks, cryptanalysis |
11 | Subhamoy Maitra, Santanu Sarkar 0001 |
Revisiting Wiener's Attack - New Weak Keys in RSA. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, RSA, Factorization, Weak Keys |
11 | Eun-Jun Yoon, Kee-Young Yoo |
Enhanced Three-Round Smart Card-Based Key Exchange Protocol. |
ATC |
2008 |
DBLP DOI BibTeX RDF |
Authentication, Cryptography, Cryptanalysis, Smart card, Password, Key exchange |
11 | Blandine Debraize, Louis Goubin |
Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
guess-and-determine attacks, stream cipher, SAT solver, algebraic cryptanalysis, self-shrinking generator, multivariate quadratic equations |
11 | Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jean-Jacques Quisquater |
On the Salsa20 Core Function. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
Salsa20, cryptanalysis, hash function, collision |
11 | Eli Biham, Yaniv Carmeli |
Efficient Reconstruction of RC4 Keys from Internal States. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
Initial Permutation, Cryptanalysis, Stream Cipher, RC4, Key Scheduling |
11 | Hüseyin Demirci, Ali Aydin Selçuk |
A Meet-in-the-Middle Attack on 8-Round AES. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
meet-in-the-middle cryptanalysis, square attack, AES, Rijndael |
11 | Subhamoy Maitra, Goutam Paul 0001 |
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
Key Leakage, Cryptanalysis, Stream Cipher, Bias, RC4, Keystream |
11 | Nicolas T. Courtois, Gregory V. Bard, David A. Wagner 0001 |
Algebraic and Slide Attacks on KeeLoq. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
unbalanced Feistel ciphers, Gröbner bases, KeeLoq, block ciphers, SAT solvers, algebraic cryptanalysis, slide attacks |
11 | Florian Mendel, Norbert Pramstaller, Christian Rechberger |
A (Second) Preimage Attack on the GOST Hash Function. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, preimage attack |
11 | Yuseop Lee, Kitae Jeong, Jaechul Sung, Seokhie Hong |
Related-Key Chosen IV Attacks on Grain-v1 and Grain-128. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Grain-v1, Grain-128, Related-key chosen IV attack, Cryptanalysis, Stream cipher |
11 | Subhamoy Maitra, Goutam Paul 0001 |
Recovering RC4 Permutation from 2048 Keystream Bytes if jIs Stuck. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Stream Cipher, Permutation, Fault Analysis, RC4, Keystream |
11 | Florian Mendel, Martin Schläffer |
Collisions for Round-Reduced LAKE. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, collision attack |
11 | Risto M. Hakala, Kaisa Nyberg |
Linear Distinguishing Attack on Shannon. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
stream ciphers, linear cryptanalysis, Distinguishing attacks, Shannon |
11 | Elena Andreeva 0001, Charles Bouillaguet, Pierre-Alain Fouque, Jonathan J. Hoch, John Kelsey, Adi Shamir, Sébastien Zimmer |
Second Preimage Attacks on Dithered Hash Functions. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Hash Function, Dithering |
11 | Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel |
A Practical Attack on KeeLoq. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
KeeLoq, cryptanalysis, block ciphers, slide attacks, meet-in-the-middle attacks |
11 | Mete Akgün, Pinar Kavak, Hüseyin Demirci |
New Results on the Key Scheduling Algorithm of RC4. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Key Scheduling Algorithm, State Table, Cryptanalysis, Stream Cipher, RC4 |
11 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
New Collision Attacks against Up to 24-Step SHA-2. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 hash family, reduced round attacks, Cryptanalysis |
11 | Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim |
New Impossible Differential Attacks on AES. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
AES, Impossible differential cryptanalysis |
11 | Deike Priemuth-Schmid, Alex Biryukov |
Slid Pairs in Salsa20 and Trivium. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Salsa20, cryptanalysis, stream ciphers, eSTREAM, Trivium |
11 | Michael Gorski, Stefan Lucks |
New Related-Key Boomerang Attacks on AES. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
related-key boomerang attack, block ciphers, AES, differential cryptanalysis |
11 | Subhamoy Maitra, Santanu Sarkar 0001 |
A New Class of Weak Encryption Exponents in RSA. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Lattice, Factorization, LLL Algorithm |
11 | Andrey Bogdanov, Ilya Kizhvatov, Andrei Pyshkin |
Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
multiple-differential collision attacks, ternary voting, AES, Side-channel attacks, DPA, collision attacks, algebraic cryptanalysis |
11 | Dmitry Khovratovich |
Two Attacks on RadioGatún. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
sponge, cryptanalysis, hash functions |
11 | Amparo Fúster-Sabater, Pino Caballero-Gil |
Cryptanalytic Attack on Cryptographic Sequence Generators: The Class of Clock-Controlled Shrinking Generators. |
ICCSA (2) |
2008 |
DBLP DOI BibTeX RDF |
interleaved sequence, cryptanalysis, Keystream generator, shrinking generator |
11 | Marco Baldi, Marco Bodrato, Franco Chiaraluce |
A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes. |
SCN |
2008 |
DBLP DOI BibTeX RDF |
QC-LDPC codes, Toom-Cook, Winograd, Cryptanalysis, McEliece cryptosystem |
11 | Mohammad Ali Orumiehchiha, S. Fahimeh Mohebbipoor |
Distinguishing Attack on SN3 Stream Cipher. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
SN3 Stream cipher, Cryptanalysis, Distinguishing Attack |
11 | Abderrahmane Nitaj |
Another Generalization of Wiener's Attack on RSA. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Coppersmith’s method, Smooth numbers, Cryptanalysis, RSA, ECM |
11 | Christophe De Cannière, Christian Rechberger |
Preimages for Reduced SHA-0 and SHA-1. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
directed random graph, cryptanalysis, hash function, SHA-1, preimages, SHA-0 |
11 | Nicolas T. Courtois, Blandine Debraize |
Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0.. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
Snow 2.0, stream ciphers, algebraic immunity, algebraic cryptanalysis, Modular addition, multivariate quadratic equations |
11 | Yossef Oren, Adi Shamir |
Remote Password Extraction from RFID Tags. |
IEEE Trans. Computers |
2007 |
DBLP DOI BibTeX RDF |
sidechannel attacks, RFID, cryptanalysis, power analysis |
11 | Dengguo Feng, Chuankun Wu |
Advances in cryptography and information security - introduction of 2002-2006 progress of SKLOIS. |
Frontiers Comput. Sci. China |
2007 |
DBLP DOI BibTeX RDF |
authentication and authorization, cryptography, network security, cryptanalysis |
11 | Goutam Paul 0001, Subhamoy Maitra |
Permutation After RC4 Key Scheduling Reveals the Secret Key. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Stream Cipher, Permutation, Bias, RC4, Key Scheduling |
11 | Håvard Raddum |
MRHS Equation Systems. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
non-linear equation systems, cryptanalysis, DES, algebraic attacks |
Displaying result #501 - #600 of 4217 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|