The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Cryptanalysis with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1982 (17) 1983-1985 (15) 1986-1988 (18) 1989-1990 (17) 1991 (19) 1992-1993 (37) 1994 (34) 1995 (18) 1996 (26) 1997 (34) 1998 (48) 1999 (43) 2000 (56) 2001 (80) 2002 (91) 2003 (108) 2004 (113) 2005 (172) 2006 (171) 2007 (181) 2008 (222) 2009 (206) 2010 (142) 2011 (177) 2012 (171) 2013 (152) 2014 (175) 2015 (209) 2016 (205) 2017 (168) 2018 (186) 2019 (188) 2020 (158) 2021 (174) 2022 (160) 2023 (183) 2024 (43)
Publication types (Num. hits)
article(2176) book(10) incollection(26) inproceedings(1893) phdthesis(112)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2108 occurrences of 562 keywords

Results
Found 4217 publication records. Showing 4217 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
11Serge Vaudenay, Martin Vuagnoux Passive-Only Key Recovery Attacks on RC4. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key related attack, cryptanalysis, stream cipher, RC4, WEP
11Tim Güneysu, Christof Paar, Jan Pelzl Attacking elliptic curve cryptosystems with special-purpose hardware. Search on Bibsonomy FPGA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Pollard's Rho, cryptanalysis, elliptic curve cryptosystem, discrete logarithm
11Goutam Paul 0001, Subhamoy Maitra, Rohit Srivastava On Non-randomness of the Permutation After RC4 Key Scheduling. Search on Bibsonomy AAECC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Key Scheduling Algorithm, Cryptography, Cryptanalysis, Stream Cipher, Bias, RC4
11Lars R. Knudsen, Vincent Rijmen Known-Key Distinguishers for Some Block Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Distinguishing algorithms, Cryptanalysis, Block Cipher, AES, Feistel ciphers
11Eun-Jun Yoon, Kee-Young Yoo Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. Search on Bibsonomy ICIC (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Public key substitution attack, Cryptanalysis, Non-repudiation, Key authentication
11Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF high order linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem
11Jorge Nakahara Jr., Ivan Carlos Pavão Impossible-Differential Attacks on Large-Block Rijndael. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF information security, Impossible differential cryptanalysis
11Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo Secure Remote User Authentication Scheme Using Bilinear Pairings. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Cryptanalysis, Smart card, Password, Bilinear pairings, Key agreement
11Orhun Kara, Cevat Manap A New Class of Weak Keys for Blowfish. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Blowfish, key dependent S-Box, self similarity analysis, cryptanalysis, fixed point, weak key, reflection attack
11Jongsung Kim, Seokhie Hong, Bart Preneel Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Ciphers, AES, Related-Key Rectangle Attack
11Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum An Analysis of the Hermes8 Stream Ciphers. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hermes8, Cryptanalysis, Stream Cipher
11Norbert Pramstaller, Mario Lamberger, Vincent Rijmen Second Preimages for Iterated Hash Functions and Their Implications on MACs. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions
11Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann Analysis of the SMS4 Block Cipher. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF UFN, cryptanalysis, block ciphers, algebraic structure
11Jorge Nakahara Jr. A Linear Analysis of Blowfish and Khufu. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Blowfish, Khufu, key-dependent S- boxes, linear cryptanalysis
11Zuhua Shao On the Sequentiality of Three Optimal Structured Multisignature Schemes. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF structured multisignature, order forge attack, Cryptanalysis, sequentiality
11François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, stream cipher, software design, FCSRs
11Markku-Juhani Olavi Saarinen Linearization Attacks Against Syndrome Based Hashes. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FSB, Syndrome Based Hashes, Provably Secure Hashes, Hash Function Cryptanalysis, Linearization Attack
11Jean-Sébastien Coron Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Coppersmith’s theorem, cryptanalysis, lattice reduction
11Ellen Jochemsz, Alexander May 0001 A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF small exponents, Coppersmith’s method, cryptanalysis, RSA, CRT
11Kerstin Lemke-Rust, Christof Paar Gaussian Mixture Models for Higher-Order Side Channel Analysis. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Higher-Order Analysis, Boolean Masking, Second-Order DPA, EM Algorithm, Gaussian Mixture Models, Templates, Side Channel Cryptanalysis
11Andrey Bogdanov, Thomas Eisenbarth 0001, Andy Rupp A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF A5/2, SMITH, cryptanalysis, GSM, Gaussian elimination, special-purpose hardware, linear systems of equations
11Eun-Jun Yoon, Kee-Young Yoo A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices. Search on Bibsonomy APWeb/WAIM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Chaotic hash, Mobile devices, Cryptanalysis, Biometric authentication
11Jiqiang Lu Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SMS4, Block cipher, Impossible differential cryptanalysis, Rectangle attack
11Jens-Matthias Bohli, Stefan Röhrich, Rainer Steinwandt Key substitution attacks revisited: Taking into account malicious signers. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key substitution, Cryptanalysis, Digital signature
11Carlisle M. Adams Designing against a class of algebraic attacks on symmetric block ciphers. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF symmetric block cipher design, substitution box round function, algebraic cryptanalysis
11Volker Gebhardt Conjugacy Search in Braid Groups. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Conjugacy search, Ultra summit set, Braid-Diffie-Hellman, Cryptography, Cryptanalysis, Encryption, Key exchange, Braid groups, Conjugacy problem
11John Black, Martin Cochran, Ryan W. Gardner A Security Analysis of the Internet Chess Club. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, cryptanalysis, online gaming, computer chess
11Wentao Zhang, Wenling Wu, Lei Zhang 0012, Dengguo Feng Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF related-key differentials, cryptanalysis, AES, impossible differentials
11Jordi Castellà-Roca, Josep Domingo-Ferrer, Francesc Sebé On the Security of a Repaired Mental Poker Protocol. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Security protocols, Mental poker
11Mun-Kyu Lee, Dowon Hong, Dong Kyue Kim Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF message authentication scheme, cryptography, cryptanalysis, cellular automata, chosen message attack
11Jovan Dj. Golic, Philip Hawkes Vectorial Approach to Fast Correlation Attacks. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF vectorial correlation attack, iterative probabilistic decoding, nonlinear filter generator, finite fields, linear cryptanalysis
11Kuo-Feng Hwang, I-En Liao Two attacks on a user friendly remote authentication scheme with smart cards. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptanalysis, smart card, remote authentication
11Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç Improving Brumley and Boneh timing attack on unprotected SSL implementations. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA, timing attacks, side-channel cryptanalysis
11Arvind Narayanan, Vitaly Shmatikov Fast dictionary attacks on passwords using time-space tradeoff. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF time-space, cryptanalysis, Markov models, passwords, tradeoff, dictionary attack
11Michael J. Wiener The Full Cost of Cryptanalytic Attacks. Search on Bibsonomy J. Cryptol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Parallel collision search, Double encryption, Triple encryption, Cryptanalysis, Factoring, Discrete logarithm, Number field sieve, Meet-in-the-middle attack, Hash collision
11Ron Steinfeld, Yuliang Zheng 0001 On the Security of RSA with Primes Sharing Least-Significant Bits. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Partial Key Exposure, Boneh-Durfee-Frankel Attack, Coppersmith Algorithm, Server-Aided Signature Generation, Cryptanalysis, RSA Cryptosystem, Communication Security, Least-Significant Bits
11Tie Liu 0002, Ramarathnam Venkatesan, Mehmet Kivanç Mihçak Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics. Search on Bibsonomy MM&Sec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF mark embedding, randomized statistics, security, optimization, verification, cryptanalysis, watermarking, quantization
11Willi Geiselmann, Willi Meier, Rainer Steinwandt An attack on the isomorphisms of polynomials problem with one secret. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cryptanalysis, Public key cryptography, Multivariate polynomials
11Phong Q. Nguyen, Igor E. Shparlinski The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, distribution, lattices, elliptic curves, discrepancy, exponential sums, ECDSA, LLL, closest vector problem
11Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert A new CRT-RSA algorithm secure against bellcore attacks. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptanalysis, RSA, smartcards, Chinese remainder theorem, faults attacks, Bellcore attack
11Baodian Wei, Dongsu Liu, Xinmei Wang Activity Attack on Rijndael . Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Rijndael Algorithm, Cryptanalysis, AES, Birthday Paradox
11Rainer Steinwandt, Willi Geiselmann, Regine Endsuleit Attacking a polynomial-based cryptosystem: Polly Cracker. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cryptanalysis, Public key cryptography, Multivariate polynomials
11Ayineedi Venkateswarlu, Subhamoy Maitra Further Results on Multiples of Primitive Polynomials and Their Products over GF(2). Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Nonlinear Combiner Model, Primitive Polynomials & Their Products, Cryptanalysis, Stream Cipher, Galois Field, Polynomial Multiples
11Christopher B. McCubbin, Ali Aydin Selçuk, Deepinder P. Sidhu Initialization Vector Attacks on the IPsec Protocol Suite. Search on Bibsonomy WETICE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF IV attacks, cryptanalysis, IPsec, Internet security
11Alejandro Hevia, Marcos A. Kiwi Strength of two data encryption standard implementations under timing attacks. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF cryptography, cryptanalysis, data encryption standard, timing attack
11Markus Michels, Markus Stadler, Hung-Min Sun On the Security of Some Variants of the RSA Signature Scheme. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF RSA variants, cryptanalysis, digital signature schemes
11Tor Helleseth, Daniel Sandberg Some Power Mappings with Low Differential Uniformity. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Planar permutation polynomials, Sequences with good correlations, Differential cryptanalysis
11Thomas R. Cain, Alan T. Sherman How to Break Gifford's Cipher (extended abstract). Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Boston Community Information System, Gifford's cipher, algorithms over finite fields, linear algebra over GF(2), primary rational canonical form, similar matrices, cryptography, cryptanalysis, stream ciphers, linear feedback shift registers, correlation attack, matrix decompositions, cryptology, similarity transformations, filter generators
11Thomas Siegenthaler Decrypting a Class of Stream Ciphers Using Ciphertext Only. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1985 DBLP  DOI  BibTeX  RDF pseudonoise generator, exhaustive trials, cryptanalysis, Correlation
11Dennie Van Tassel Advanced cryptographic techniques for computer. Search on Bibsonomy Commun. ACM The full citation details ... 1969 DBLP  DOI  BibTeX  RDF confidential information processing, secrecy systems, cryptanalysis, security systems, ciphers, cryptographic
11Pu Sun, Fu Song, Yuqi Chen 0001, Taolue Chen EasyBC: A Cryptography-Specific Language for Security Analysis of Block Ciphers against Differential Cryptanalysis. Search on Bibsonomy Proc. ACM Program. Lang. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Dolendro Singh Laiphrakpam, Rohit Thingbaijam, Ripon Patgiri, Motilal Singh Khoirom Cryptanalysis of cross-coupled chaotic maps multi-image encryption scheme. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Heping Wen, Yiting Lin Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Murat Burhan Ilter, Ali Aydin Selçuk MILP modeling of matrix multiplication: cryptanalysis of KLEIN and PRINCE. Search on Bibsonomy Turkish J. Electr. Eng. Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Eugen Antal The origin of military cryptanalysis in Czechoslovakia. Search on Bibsonomy Cryptologia The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Ahmad Kabil, Heba Aslan, Marianne Azer Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks. Search on Bibsonomy Cryptogr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Nasratullah Ghafoori, Atsuko Miyaji Higher-Order Differential-Linear Cryptanalysis of ChaCha Stream Cipher. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Atiyeh Mirzaie, Siavash Ahmadi, Mohammad Reza Aref Integral Cryptanalysis of Round-Reduced Shadow-32 for IoT Nodes. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Xiaodong Yang 0006, Wenjia Wang, Tian Tian, Caifen Wang Cryptanalysis and Improvement of a Blockchain-Based Certificateless Signature for IIoT Devices. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Samir Hodzic, Arnab Roy 0005, Elena Andreeva 0001 Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Aaradh Nepal, Francesco Perono Cacciafoco Minoan Cryptanalysis: Computational Approaches to Deciphering Linear A and Assessing Its Connections with Language Families from the Mediterranean and the Black Sea Areas. Search on Bibsonomy Inf. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Shan Shan, Bo Zhang 0020 Cryptanalysis of a Certificateless Signcryption Scheme for Wireless Sensor Networks in Ubiquitous Healthcare Systems. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Loïc Bidoux, Pierre Briaud, Maxime Bros, Philippe Gaborit RQC Revisited and More Cryptanalysis for Rank-Based Cryptography. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Zakaria Tolba Cryptanalysis and improvement of multimodal data encryption by machine-learning-based system. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Weixi Zheng, Liu Zhang, Zilong Wang Theoretical Explanation and Improvement of Deep Learning-aided Cryptanalysis. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Hoeteck Wee, David J. Wu 0001 Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey Differential Cryptanalysis of a Lightweight Block Cipher LELBC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Peigen Li, Jintai Ding Cryptanalysis of the SNOVA signature scheme. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Tim Beyne, Addie Neyt Note on the cryptanalysis of Speedy. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Emanuele Bellini 0002, Alessandro De Piccoli, Mattia Formenti, David Gérault, Paul Huynh, Simone Pelizzola, Sergio Polese, Andrea Visconti Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia Improved Differential Meet-In-The-Middle Cryptanalysis. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Charles Bouillaguet, Julia Sauvage Preliminary Cryptanalysis of the Biscuit Signature Scheme. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Valerie Gilchrist, Laurane Marco, Christophe Petit 0001, Gang Tang Solving the Tensor Isomorphism Problem for special orbits with low rank points: Cryptanalysis and repair of an Asiacrypt 2023 commitment scheme. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Sidoine Juicielle Kambiré, Guy Mobouale Wamba, Abiodoun Clement Hounkpevi, Daniel Tieudjo, Djiby Sow Cryptanalysis of signature schemes based on the root extraction problem over braid group. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Mahender Kumar Cryptanalysis of Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Guilhem Mureau, Alice Pellet-Mary, Heorhii Pliatsok, Alexandre Wallet Cryptanalysis of rank-2 module-LIP in Totally Real Number Fields. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Katharina Koschatko, Reinhard Lüftenegger, Christian Rechberger Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher New Models for the Cryptanalysis of ASCON. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
11Haiyan Sun, Chaoyang Li, Jianwei Zhang, Shujun Liang, Wanwei Huang Cryptanalysis and Improvement of Several Identity-Based Authenticated and Pairing-Free Key Agreement Protocols for IoT Applications. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Himadry Sekhar Roy, Prakash Dey, Sandip Kumar Mondal, Avishek Adhikari Cryptanalysis of full round FUTURE with multiple biclique structures. Search on Bibsonomy Peer Peer Netw. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Sadegh Sadeghi, Nasour Bagheri Cryptanalysis of DBST, a lightweight block cipher. Search on Bibsonomy Frontiers Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Le He, Hongbo Yu Cryptanalysis of Reduced-Round SipHash. Search on Bibsonomy Comput. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Yin Lv, Danping Shi, Lei Hu, Zihui Guo, Yi Guo, Caibing Wang Improved Linear Cryptanalysis of Block Cipher BORON. Search on Bibsonomy Comput. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Chunning Zhou, Wentao Zhang, Weiwei Cao A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON. Search on Bibsonomy Comput. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Hosein Hadipour, Yosuke Todo Cryptanalysis of QARMAv2. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Gaëtan Leurent Symmetric Cryptanalysis Beyond Primitives. Search on Bibsonomy 2024   RDF
11Cihangir Tezcan GPU-Based Brute Force Cryptanalysis of KLEIN. Search on Bibsonomy ICISSP The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu 0008, Mehdi Tibouchi, Masayuki Abe Cryptanalysis of the Peregrine Lattice-Based Signature Scheme. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Max Cartor, Ryann Cartor, Hiroki Furue, Daniel Smith-Tone Improved Cryptanalysis of HFERP. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia Improved Differential Meet-in-the-Middle Cryptanalysis. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Guilhem Mureau, Alice Pellet-Mary, Georgii Pliatsok, Alexandre Wallet Cryptanalysis of Rank-2 Module-LIP in Totally Real Number Fields. Search on Bibsonomy EUROCRYPT (6) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
11Ahmed S. Shatnawi, Mahmoud M. Almazari, Zakarea AlShara, Eyad Taqieddin, Dheya Mustafa RSA cryptanalysis - Fermat factorization exact bound and the role of integer sequences in factorization problem. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Yanbin Xu, Yonglin Hao, Mingxing Wang Revisit two memoryless state-recovery cryptanalysis methods on A5/1. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Ayoub Otmani, Christophe Petit 0001, Mehdi Tibouchi Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jiajie Liu, Bing Sun, Chao Li Design and cryptanalysis of a new iterative structure. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Jun Liu, Dachao Wang, Yupu Hu, Jie Chen, Baocang Wang Improved integral cryptanalysis of SPNbox in digital rights management systems. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Kenneth J. Bures Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine. Search on Bibsonomy Cryptologia The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Olaf Ostwald, Frode Weierud Modern cryptanalysis of the Truppenschlüssel. Search on Bibsonomy Cryptologia The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
11Leonardo Campanelli A statistical cryptanalysis of the Beale ciphers. Search on Bibsonomy Cryptologia The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 4217 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license