The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Attack with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1958-1979 (15) 1980-1984 (18) 1985 (16) 1986-1987 (20) 1988 (19) 1989 (17) 1990 (27) 1991 (28) 1992 (20) 1993 (28) 1994 (50) 1995 (27) 1996 (38) 1997 (59) 1998 (89) 1999 (106) 2000 (150) 2001 (198) 2002 (308) 2003 (427) 2004 (622) 2005 (935) 2006 (1052) 2007 (1092) 2008 (1214) 2009 (940) 2010 (445) 2011 (529) 2012 (502) 2013 (529) 2014 (687) 2015 (718) 2016 (756) 2017 (964) 2018 (1272) 2019 (1607) 2020 (1779) 2021 (2136) 2022 (2366) 2023 (2631) 2024 (644)
Publication types (Num. hits)
article(10248) book(12) data(26) incollection(215) inproceedings(14469) phdthesis(107) proceedings(3)
Venues (Conferences, Journals, ...)
CoRR(2518) IACR Cryptol. ePrint Arch.(797) IEEE Access(430) IEEE Trans. Inf. Forensics Sec...(193) FSE(178) Comput. Secur.(177) CRYPTO(176) EUROCRYPT(172) CCS(152) Sensors(140) ICC(138) Secur. Commun. Networks(133) ACISP(115) GLOBECOM(114) ARES(113) CHES(113) More (+10 of total 3434)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 8634 occurrences of 2564 keywords

Results
Found 25080 publication records. Showing 25080 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
22Leonie Simpson, Jovan Dj. Golic, Ed Dawson A Probabilistic Correlation Attack on the Shrinking Generator. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Cryptography, Stream ciphers, Correlation attacks, Shrinking generator
22Chae Hoon Lim, Pil Joong Lee A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
22Eli Biham, Alex Biryukov An Improvement of Davies' Attack on DES. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
22Yvo Desmedt, Andrew M. Odlyzko A Chosen Text Attack on the RSA Cryptosystem and Some Discrete Logarithm Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
22Jie Wang 0001, Raphael C.-W. Phan, John N. Whitley, David J. Parish Augmented Attack Tree Modeling of Distributed Denial of Services and Tree Based Attack Detection Method. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Augmented Attack Tree, Modeling, DDoS, Bottom-up, Detection Algorithm
22Michael Kohnen, Mike Leske, Erwin P. Rathgeb Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network. Search on Bibsonomy Networking The full citation details ... 2009 DBLP  DOI  BibTeX  RDF P2P security, Eclipse attack, Sybil attack, Kad
22S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan On the Security of Identity Based Ring Signcryption Schemes. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Ring Signcryption, Adaptive Chosen Ciphertext Attack, Cryptanalysis, Provable Security, Confidentiality, Bilinear Pairing, Random Oracle Model, Chosen Plaintext Attack
22Yuichi Sei, Shinichi Honiden Reporter node determination of replicated node detection in wireless sensor networks. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF node compromising attack, node replication attack, security, wireless sensor networks, algorithm
22Falko Strenzke, Erik Tews, H. Gregor Molter, Raphael Overbeck, Abdulhadi Shoufan Side Channels in the McEliece PKC. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF side channel attack, timing attack, post quantum cryptography
22Jintai Ding, Bo-Yin Yang, Chia-Hsin Owen Chen, Ming-Shing Chen, Chen-Mou Cheng New Differential-Algebraic Attacks and Reparametrization of Rainbow. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF oil-and-vinegar, rank, algebraic attack, differential attack
22Yuichi Sei, Shinichi Honiden Distributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks. Search on Bibsonomy WICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF node compromising attack, node replication attack, security, wireless sensor networks, algorithm
22Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta 0001 A GF(p) elliptic curve group operator resistant against side channel attacks. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF gf(p) elliptic curve, elliptic curve cryptosystem, side-channel analysis, timing attack, power analysis attack
22Chu-Hsing Lin, Jung-Chun Liu, Hsun-Chi Huang, Tsung-Che Yang Using Adaptive Bandwidth Allocation Approach to Defend DDoS Attacks. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF bandwidth, network simulator, priority queue, DDoS attack, IP spoofing, DoS attack
22Yannis Soupionis, Stelios Dritsas, Dimitris Gritzalis An Adaptive Policy-Based Approach to SPIT Management. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SPIT, Policy, VoIP, Rules, Actions, Attack Graphs, Attack Trees
22Eli Biham, Yaniv Carmeli, Adi Shamir Bug Attacks. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Bug attack, Pohlig-Hellman, RSA, ECC, Fault attack
22Debojyoti Bhattacharya, Nitin Bansal, Amitava Banerjee, Dipanwita Roy Chowdhury A Near Optimal S-Box Design. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cellular Automata, Algebraic Attack, S-box, Power Attack
20Kwangsoo Lee, Andreas Westfeld, Sangjin Lee 0002 Generalised Category Attack - Improving Histogram-Based Attack on JPEG LSB Embedding. Search on Bibsonomy Information Hiding The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Yanxiang He, Wei Chen 0006, Wenling Peng, Min Yang 0001 Efficient and Beneficial Defense Against DDoS Direct Attack and Reflector Attack. Search on Bibsonomy ISPA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Yongzhuang Wei, YuPu Hu New related-key rectangle attacks on reduced AES-192 and AES-256. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher, Advanced Encryption Standard, time complexity, related-key rectangle attack
20Xiangui Kang, Jiwu Huang, Wenjun Zeng, Yun Q. Shi 0001 Non-ambiguity of blind watermarking: a revisit with analytical resolution. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Abstract watermarking, ambiguity attack, PRSG sequence, computational indistinguishability, digital rights management (DRM)
20Norman Danner, Danny Krizanc, Marc Liberatore Detecting Denial of Service Attacks in Tor. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF reliability, Anonymity, denial of service, detection, attack
20Honglong Chen, Wei Lou, Zhi Wang 0003 A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs. Search on Bibsonomy WASA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless sensor networks, Consistency, wormhole attack, secure localization
20Florian Mendel, Christian Rechberger, Martin Schläffer Cryptanalysis of Twister. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Twister, hash function, collision-, preimage attack, SHA-3, second-preimage-
20Jianhong Zhang, Yixian Yang, Xinxin Niu, Shengnan Gao, Hua Chen, Qin Geng An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF On-line/off-line signature, Forgeability, Attack, Security Analysis
20Thibault Cholez, Isabelle Chrisment, Olivier Festor Evaluation of Sybil Attacks Protection Schemes in KAD. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, DHT, P2P networks, Sybil attack, KAD, defense
20Sebastiaan Indesteege, Bart Preneel Practical Collisions for EnRUPT. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF EnRUPT, hash function, collision attack, SHA-3 candidate
20Xiaoyun Wang 0001, Hongbo Yu, Wei Wang 0035, Haina Zhang, Tao Zhan Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MDx-MAC, Distinguishing attack, MD5, Key recovery, HMAC, NMAC
20Philipp Grabher, Johann Großschädl, Dan Page Non-deterministic processors: FPGA-based analysis of area, performance and security. Search on Bibsonomy WESS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF micro-architectural countermeasures, non-deterministic processors, side-channel attack, processor design
20Kun Peng, Feng Bao 0001 A Design of Secure Preferential E-Voting. Search on Bibsonomy VoteID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF preferential e-voting, coercion attack, security
20Hongjie He, Jiashu Zhang, Heng-Ming Tai Self-recovery Fragile Watermarking Using Block-Neighborhood Tampering Characterization. Search on Bibsonomy Information Hiding The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block-neighborhood characterization, constant-average attack, fragile watermarking, self-recovery
20Thanh-Ha Le, Cécile Canovas, Jessy Clédière An overview of side channel analysis attacks. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF side channel attacks, stochastic model, DPA, DEMA, CPA, template attack
20Daniel J. Bernstein, Tanja Lange 0001, Christiane Peters Attacking and Defending the McEliece Cryptosystem. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Stern attack, minimal weight code word, list decoding binary Goppa codes, security analysis, McEliece cryptosystem
20Sanjam Garg, Huzur Saran Anti-DDoS Virtualized Operating System. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Performance, Virtualization, Malware, Distributed Denial of Service Attack
20Jung-Keun Lee, Dong Hoon Lee 0002, Sangwoo Park Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Sosemanuk, SNOW 2.0, linear mask, stream cipher, correlation attack
20Xiangbin Cheng, Jun Bi, Xing Li Swing - A Novel Mechanism Inspired by Shim6 Address-Switch Conception to Limit the Effectiveness of DoS Attacks. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IPv6, Shim6, DoS attack
20Stéphane Manuel, Thomas Peyrin Collisions on SHA-0 in One Hour. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, SHA-0, boomerang attack
20Florian Mendel, Martin Schläffer Collisions for Round-Reduced LAKE. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, collision attack
20Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision
20Michael Gorski, Stefan Lucks New Related-Key Boomerang Attacks on AES. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF related-key boomerang attack, block ciphers, AES, differential cryptanalysis
20Mohammad Ali Orumiehchiha, S. Fahimeh Mohebbipoor, Hossein Ghodosi Cryptanalysis of MV3 Stream Cipher. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MV3 Algorithm, Cryptanalysis, Stream Ciphers, Distinguishing Attack
20Youngsook Lee, Junghyun Nam, Dongho Won Vulnerabilities in a Remote Agent Authentication Scheme Using Smart Cards. Search on Bibsonomy KES-AMSTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed system, smart card, impersonation attack, authentication scheme
20Michael P. O'Mahony, Barry Smyth Collaborative web search: a robustness analysis. Search on Bibsonomy Artif. Intell. Rev. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Malicious attack, Robustness, Personalisation, Collaborative web search
20Chong Hee Kim, Jean-Jacques Quisquater Faults, Injection Methods, and Fault Attacks. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF fault injection, fault, fault attack, cryptographic algorithm
20Heejo Lee, Minjin Kwon, Geoffrey Hasker, Adrian Perrig BASE: an incrementally deployable mechanism for viable IP spoofing prevention. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF BGP anti-spoofing extension, packet marking and filtering, DDoS attack, IP spoofing
20Yacine Djemaiel, Noureddine Boudriga A global marking scheme for tracing cyber attacks. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF global marking, malicious activity, digital investigation, security attack
20Debasis Giri, Parmeshwary Dayal Srivastava Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Smart card, Attack, Timestamp, Nonce
20Daewan Han, Myung-Hwan Kim, Yongjin Yeom Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Paeng-Jung-Ha cryptosystem, GGH, NTRUEncrypt, Lattice attack
20Orhun Kara, Cevat Manap A New Class of Weak Keys for Blowfish. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Blowfish, key dependent S-Box, self similarity analysis, cryptanalysis, fixed point, weak key, reflection attack
20Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro New Message Difference for MD4. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Message Difference, Hash Function, Collision Attack, MD4, Local Collision, Differential Path
20Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim 0001 Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Eagle-64, Eagle-128, Related-key Amplified Boomerang Attack, Block Ciphers, Data-Dependent Operations
20Ikkyun Kim, Koohong Kang, Yangseo Choi, Daewon Kim, Jintae Oh, Kijun Han A Practical Approach for Detecting Executable Codes in Network Traffic. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF zero-day attack, malicious code, signature generation
20Tetsuya Izu, Takeshi Shimoyama, Masahiko Takenaka How to Forge a Time-Stamp Which Adobe's Acrobat Accepts. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bleichenbacher’s forgery attack, RSASSA-PKCS-v1_5, time-stamp forgery, Acrobat, Acrobat Reader
20David Jao, S. Ramesh Raju, Ramarathnam Venkatesan Digit Set Randomization in Elliptic Curve Cryptography. Search on Bibsonomy SAGA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF randomized representations, non-adjacent form representations, side channel attack countermeasures, elliptic curve cryptography
20Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten Differential Power Analysis of Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain
20Hua Chen 0011, Wenling Wu, Dengguo Feng Differential Fault Analysis on CLEFIA. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Generalized Feistel Structure, Differential Fault Attack, Block Cipher
20Martin Hell, Thomas Johansson 0001 Cryptanalysis of Achterbahn-Version 2. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream ciphers, key recovery attack
20Hongjun Wu 0001, Bart Preneel Cryptanalysis of the Stream Cipher ABC v2. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key-dependent S-box, ABC v2, stream cipher, Fast correlation attack
20Jian Yin 0006, Sanjay Kumar Madria A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks. Search on Bibsonomy SUTC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Black hole attack, Sensor networks
20Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. Search on Bibsonomy AAECC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF overdefined systems of nonlinear equations, state transition matrix, cryptanalysis, stream ciphers, decoding, LFSRs, algebraic attacks, fast correlation attack, decimation, keystream generators
20Roland Rieke Modelling and Analysing Network Security Policies in a Given Vulnerability Setting. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack simulation, network security policies, security modelling and simulation, risk assessment, threats analysis, critical infrastructure protection
20Yongsu Park, Younho Lee, Heeyoul Kim, Gil-Joo Lee, Il-Hee Kim Hardware Stack Design: Towards an Effective Defence Against Frame Pointer Overwrite Attacks. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF computer architecture, computer security, buffer overflow attack
20Jiqiang Lu Security Weaknesses in Two Proxy Signature Schemes. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Public key cryptology, Proxy signature, Forgery attack
20Dag Arne Osvik, Adi Shamir, Eran Tromer Cache Attacks and Countermeasures: The Case of AES. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cache, cryptanalysis, AES, side-channel attack, memory access
20Yongsu Park, Yong Ho Song, Eul-Gyu Im Design of a Reliable Hardware Stack to Defend Against Frame Pointer Overwrite Attacks. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF computer architecture, computer security, buffer overflow attack
20Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF nonlinear combination keystream generator, state transition matrix, Stream ciphers, LFSRs, algebraic attacks, fast correlation attack, decimation
20Tanmoy Kanti Das, Jianying Zhou 0001 Cryptanalysis of Barni et al. Watermarking Scheme. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Watermark Recovery, Copy Attack, Cryptanalysis, Wavelet Transform
20An Braeken, Bart Preneel Probabilistic Algebraic Attacks. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Walsh spectrum, combination and filter generator, Algebraic attack, algebraic immunity, annihilator
20Kris Tiri, David D. Hwang, Alireza Hodjat, Bo-Cheng Lai, Shenglin Yang, Patrick Schaumont, Ingrid Verbauwhede Prototype IC with WDDL and Differential Routing - DPA Resistance Assessment. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dual rail with precharge, wave dynamic differential logic (WDDL), differential routing, parasitic capacitance matching, side-channel attack (SCA), differential power analysis (DPA), countermeasure
20Gwenaël J. Doërr, Jean-Luc Dugelay, Lucas Grangé Exploiting self-similarities to defeat digital watermarking systems: a case study on still images. Search on Bibsonomy MM&Sec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF block replacement attack, intra-signal collusion, self-similarities
20Hyungwoo Kang, Soon Jwa Hong, Dong Hoon Lee 0001 Matching Connection Pairs. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Connection pairs, Detoured attack, Traceback, Stepping stone, Backdoor
20Kai Schramm, Thomas J. Wollinger, Christof Paar A New Class of Collision Attacks and Its Application to DES. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF internal collisions, side channel attacks, power analysis, DES, S-Boxes, collision attack
20Chik How Tan, Xun Yi, Chee Kheong Siew A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF adaptive chosen-ciphertext attack, Public key cryptosystem, shift registers
20Ulrich Kühn 0001 Improved Cryptanalysis of MISTY1. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Slicing Attack, Cryptanalysis, Block cipher, Impossible Differential
20Hitoshi Yanami, Takeshi Shimoyama Differential Cryptanalysis of a Reduced-Round SEED. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF symmetric block cipher, probability, differential attack, characteristic, SEED
20Philip Hawkes, Frank Quick, Gregory G. Rose A Practical Cryptanalysis of SSC2. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF SSC2, fast correlation attack
20Zhi-Guo Chen, Stafford E. Tavares Toward Provable Security of Substitution-Permutation Encryption Networks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF XOR table, block cipher, provable security, nonlinearity, differential attack
20Daniel Bleichenbacher Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF PKCS, RSA, SSL, chosen ciphertext attack
20Thomas Jakobson Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF interpolation attack, non-linear relations, Sudan's algorithm, Cryptanalysis, block cipher, Reed-Solomon codes
20Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway Relations Among Notions of Security for Public-Key Encryption Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Asymmetric encryption, Rackoff-Simon attack, Relations among definitions, Chosen ciphertext security, Non-malleability, Plaintext awareness
20Paul Ammann, Sushil Jajodia, Catherine D. McCollum, Barbara T. Blaustein Surviving information warfare attacks on databases. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF information warfare attack survival, fault tolerance approach, damaged data, partially repaired data, snapshot algorithm, damage markings, consistency preserving normal transactions, countermeasure transactions, databases, protocol, security of data, integrity constraints, data security, database consistency
20Richard E. Smith Mandatory Protection for Internet Server Software. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF multilevel security applications, Internet server software, server overrun, attack code, server host, mandatory protection mechanisms, commercial systems, Unix chroot isolation, type enforcement, server protection, Internet, MLS, security flaws
19Saurabh Amin, Xavier Litrico, Shankar Sastry 0001, Alexandre M. Bayen Stealthy deception attacks on water SCADA systems. Search on Bibsonomy HSCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF secure control systems, switching pdes, water mangement
19Michalis Foukarakis, Demetres Antoniades, Michalis Polychronakis Deep packet anonymization. Search on Bibsonomy EUROSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Manabu Inuma, Akira Otsuka, Hideki Imai Theoretical Framework for Constructing Matching Algorithms in Biometric Authentication Systems. Search on Bibsonomy ICB The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Rui Wang 0010, Yong Fuga Li, XiaoFeng Wang 0001, Haixu Tang, Xiao-yong Zhou Learning your identity and disease from research papers: information leaks in genome wide association study. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF genome wide association study, test statistics, integer programming, markov model, single nucleotide polymorphism
19Ruishan Zhang, Xinyuan Wang 0005, Ryan Farley, Xiaohui Yang, Xuxian Jiang On the feasibility of launching the man-in-the-middle attacks on VoIP from remote attackers. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DNS spoofing, MITM attacks, SIP, VoIP security
19Leila Amgoud, Philippe Besnard Bridging the Gap between Abstract Argumentation Systems and Logic. Search on Bibsonomy SUM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Daniel Kifer Attacks on privacy and deFinetti's theorem. Search on Bibsonomy SIGMOD Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF random worlds, privacy
19Yu Sasaki, Kazumaro Aoki Finding Preimages in Full MD5 Faster Than Exhaustive Search. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF splice-and-cut, hash function, MD5, preimage, one-way, local collision
19Itai Dinur, Adi Shamir Cube Attacks on Tweakable Black Box Polynomials. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cube attacks, tweakable black box polynomials, Cryptanalysis, stream ciphers, algebraic attacks, Trivium
19Dmitry Khovratovich, Alex Biryukov, Ivica Nikolic Speeding up Collision Search for Byte-Oriented Hash Functions. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Mihir Bellare, Chanathip Namprempre Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Message authentication, Authenticated encryption, Symmetric encryption, Concrete security
19Daniel S. Fava, Stephen R. Byers, Shanchieh Jay Yang Projecting Cyberattacks Through Variable-Length Markov Models. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Hakem Beitollahi, Geert Deconinck FOSeL: Filtering by Helping an Overlay Security Layer to Mitigate DoS Attacks. Search on Bibsonomy NCA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Huaqun Wang, Hong Yu Cryptanalysis of Two Ring Signcryption Schemes. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ring signcryption, privacy and trust, cryptanalysis, certificateless cryptography
19Amin Hassanzadeh, Babak Sadeghian Intrusion Detection with Data Correlation Relation Graph. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF correlation relation graph, synflood, regression line, intrusion detection, correlation coefficient, data correlation
19Shui Yu 0001, Wanlei Zhou 0001 Entropy-Based Collaborative Detection of DDOS Attacks on Community Networks. Search on Bibsonomy PerCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Suman Deb Roy, Sneha Aman Singh, Subhrabrata Choudhury, Narayan C. Debnath Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Van-Hau Pham, Marc Dacier, Guillaume Urvoy-Keller, Taoufik En-Najjary The Quest for Multi-headed Worms. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Junko Takahashi, Toshinori Fukunaga Improved Differential Fault Analysis on CLEFIA. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 25080 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license