|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2108 occurrences of 562 keywords
|
|
|
Results
Found 4217 publication records. Showing 4217 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
11 | Serge Vaudenay, Martin Vuagnoux |
Passive-Only Key Recovery Attacks on RC4. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
key related attack, cryptanalysis, stream cipher, RC4, WEP |
11 | Tim Güneysu, Christof Paar, Jan Pelzl |
Attacking elliptic curve cryptosystems with special-purpose hardware. |
FPGA |
2007 |
DBLP DOI BibTeX RDF |
Pollard's Rho, cryptanalysis, elliptic curve cryptosystem, discrete logarithm |
11 | Goutam Paul 0001, Subhamoy Maitra, Rohit Srivastava |
On Non-randomness of the Permutation After RC4 Key Scheduling. |
AAECC |
2007 |
DBLP DOI BibTeX RDF |
Key Scheduling Algorithm, Cryptography, Cryptanalysis, Stream Cipher, Bias, RC4 |
11 | Lars R. Knudsen, Vincent Rijmen |
Known-Key Distinguishers for Some Block Ciphers. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Distinguishing algorithms, Cryptanalysis, Block Cipher, AES, Feistel ciphers |
11 | Eun-Jun Yoon, Kee-Young Yoo |
Improving the Sun-Cao's Public Key Authentication Scheme for Non-repudiation. |
ICIC (3) |
2007 |
DBLP DOI BibTeX RDF |
Public key substitution attack, Cryptanalysis, Non-repudiation, Key authentication |
11 | Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner |
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
high order linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem |
11 | Jorge Nakahara Jr., Ivan Carlos Pavão |
Impossible-Differential Attacks on Large-Block Rijndael. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
information security, Impossible differential cryptanalysis |
11 | Eun-Jun Yoon, Wan-Soo Lee, Kee-Young Yoo |
Secure Remote User Authentication Scheme Using Bilinear Pairings. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Cryptanalysis, Smart card, Password, Bilinear pairings, Key agreement |
11 | Orhun Kara, Cevat Manap |
A New Class of Weak Keys for Blowfish. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Blowfish, key dependent S-Box, self similarity analysis, cryptanalysis, fixed point, weak key, reflection attack |
11 | Jongsung Kim, Seokhie Hong, Bart Preneel |
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Ciphers, AES, Related-Key Rectangle Attack |
11 | Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum |
An Analysis of the Hermes8 Stream Ciphers. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Hermes8, Cryptanalysis, Stream Cipher |
11 | Norbert Pramstaller, Mario Lamberger, Vincent Rijmen |
Second Preimages for Iterated Hash Functions and Their Implications on MACs. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
iterated hash functions, block-cipher based hash functions, differential cryptanalysis, second preimage, double block-length hash functions |
11 | Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann |
Analysis of the SMS4 Block Cipher. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
UFN, cryptanalysis, block ciphers, algebraic structure |
11 | Jorge Nakahara Jr. |
A Linear Analysis of Blowfish and Khufu. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
Blowfish, Khufu, key-dependent S- boxes, linear cryptanalysis |
11 | Zuhua Shao |
On the Sequentiality of Three Optimal Structured Multisignature Schemes. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
structured multisignature, order forge attack, Cryptanalysis, sequentiality |
11 | François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier |
X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, stream cipher, software design, FCSRs |
11 | Markku-Juhani Olavi Saarinen |
Linearization Attacks Against Syndrome Based Hashes. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
FSB, Syndrome Based Hashes, Provably Secure Hashes, Hash Function Cryptanalysis, Linearization Attack |
11 | Jean-Sébastien Coron |
Finding Small Roots of Bivariate Integer Polynomial Equations: A Direct Approach. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
Coppersmith’s theorem, cryptanalysis, lattice reduction |
11 | Ellen Jochemsz, Alexander May 0001 |
A Polynomial Time Attack on RSA with Private CRT-Exponents Smaller Than N 0.073. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
small exponents, Coppersmith’s method, cryptanalysis, RSA, CRT |
11 | Kerstin Lemke-Rust, Christof Paar |
Gaussian Mixture Models for Higher-Order Side Channel Analysis. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
Higher-Order Analysis, Boolean Masking, Second-Order DPA, EM Algorithm, Gaussian Mixture Models, Templates, Side Channel Cryptanalysis |
11 | Andrey Bogdanov, Thomas Eisenbarth 0001, Andy Rupp |
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
A5/2, SMITH, cryptanalysis, GSM, Gaussian elimination, special-purpose hardware, linear systems of equations |
11 | Eun-Jun Yoon, Kee-Young Yoo |
A Secure Chaotic Hash-Based Biometric Remote User Authentication Scheme Using Mobile Devices. |
APWeb/WAIM Workshops |
2007 |
DBLP DOI BibTeX RDF |
Chaotic hash, Mobile devices, Cryptanalysis, Biometric authentication |
11 | Jiqiang Lu |
Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
SMS4, Block cipher, Impossible differential cryptanalysis, Rectangle attack |
11 | Jens-Matthias Bohli, Stefan Röhrich, Rainer Steinwandt |
Key substitution attacks revisited: Taking into account malicious signers. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Key substitution, Cryptanalysis, Digital signature |
11 | Carlisle M. Adams |
Designing against a class of algebraic attacks on symmetric block ciphers. |
Appl. Algebra Eng. Commun. Comput. |
2006 |
DBLP DOI BibTeX RDF |
symmetric block cipher design, substitution box round function, algebraic cryptanalysis |
11 | Volker Gebhardt |
Conjugacy Search in Braid Groups. |
Appl. Algebra Eng. Commun. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Conjugacy search, Ultra summit set, Braid-Diffie-Hellman, Cryptography, Cryptanalysis, Encryption, Key exchange, Braid groups, Conjugacy problem |
11 | John Black, Martin Cochran, Ryan W. Gardner |
A Security Analysis of the Internet Chess Club. |
IEEE Secur. Priv. |
2006 |
DBLP DOI BibTeX RDF |
security, cryptanalysis, online gaming, computer chess |
11 | Wentao Zhang, Wenling Wu, Lei Zhang 0012, Dengguo Feng |
Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
related-key differentials, cryptanalysis, AES, impossible differentials |
11 | Jordi Castellà-Roca, Josep Domingo-Ferrer, Francesc Sebé |
On the Security of a Repaired Mental Poker Protocol. |
ITNG |
2006 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Security protocols, Mental poker |
11 | Mun-Kyu Lee, Dowon Hong, Dong Kyue Kim |
Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
message authentication scheme, cryptography, cryptanalysis, cellular automata, chosen message attack |
11 | Jovan Dj. Golic, Philip Hawkes |
Vectorial Approach to Fast Correlation Attacks. |
Des. Codes Cryptogr. |
2005 |
DBLP DOI BibTeX RDF |
vectorial correlation attack, iterative probabilistic decoding, nonlinear filter generator, finite fields, linear cryptanalysis |
11 | Kuo-Feng Hwang, I-En Liao |
Two attacks on a user friendly remote authentication scheme with smart cards. |
ACM SIGOPS Oper. Syst. Rev. |
2005 |
DBLP DOI BibTeX RDF |
cryptanalysis, smart card, remote authentication |
11 | Onur Aciiçmez, Werner Schindler, Çetin Kaya Koç |
Improving Brumley and Boneh timing attack on unprotected SSL implementations. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
RSA, timing attacks, side-channel cryptanalysis |
11 | Arvind Narayanan, Vitaly Shmatikov |
Fast dictionary attacks on passwords using time-space tradeoff. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
time-space, cryptanalysis, Markov models, passwords, tradeoff, dictionary attack |
11 | Michael J. Wiener |
The Full Cost of Cryptanalytic Attacks. |
J. Cryptol. |
2004 |
DBLP DOI BibTeX RDF |
Parallel collision search, Double encryption, Triple encryption, Cryptanalysis, Factoring, Discrete logarithm, Number field sieve, Meet-in-the-middle attack, Hash collision |
11 | Ron Steinfeld, Yuliang Zheng 0001 |
On the Security of RSA with Primes Sharing Least-Significant Bits. |
Appl. Algebra Eng. Commun. Comput. |
2004 |
DBLP DOI BibTeX RDF |
Partial Key Exposure, Boneh-Durfee-Frankel Attack, Coppersmith Algorithm, Server-Aided Signature Generation, Cryptanalysis, RSA Cryptosystem, Communication Security, Least-Significant Bits |
11 | Tie Liu 0002, Ramarathnam Venkatesan, Mehmet Kivanç Mihçak |
Scale-invariant image watermarking via optimization algorithms for quantizing randomized statistics. |
MM&Sec |
2004 |
DBLP DOI BibTeX RDF |
mark embedding, randomized statistics, security, optimization, verification, cryptanalysis, watermarking, quantization |
11 | Willi Geiselmann, Willi Meier, Rainer Steinwandt |
An attack on the isomorphisms of polynomials problem with one secret. |
Int. J. Inf. Sec. |
2003 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Public key cryptography, Multivariate polynomials |
11 | Phong Q. Nguyen, Igor E. Shparlinski |
The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces. |
Des. Codes Cryptogr. |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, distribution, lattices, elliptic curves, discrepancy, exponential sums, ECDSA, LLL, closest vector problem |
11 | Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert |
A new CRT-RSA algorithm secure against bellcore attacks. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, RSA, smartcards, Chinese remainder theorem, faults attacks, Bellcore attack |
11 | Baodian Wei, Dongsu Liu, Xinmei Wang |
Activity Attack on Rijndael . |
AINA |
2003 |
DBLP DOI BibTeX RDF |
Rijndael Algorithm, Cryptanalysis, AES, Birthday Paradox |
11 | Rainer Steinwandt, Willi Geiselmann, Regine Endsuleit |
Attacking a polynomial-based cryptosystem: Polly Cracker. |
Int. J. Inf. Sec. |
2002 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Public key cryptography, Multivariate polynomials |
11 | Ayineedi Venkateswarlu, Subhamoy Maitra |
Further Results on Multiples of Primitive Polynomials and Their Products over GF(2). |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
Nonlinear Combiner Model, Primitive Polynomials & Their Products, Cryptanalysis, Stream Cipher, Galois Field, Polynomial Multiples |
11 | Christopher B. McCubbin, Ali Aydin Selçuk, Deepinder P. Sidhu |
Initialization Vector Attacks on the IPsec Protocol Suite. |
WETICE |
2000 |
DBLP DOI BibTeX RDF |
IV attacks, cryptanalysis, IPsec, Internet security |
11 | Alejandro Hevia, Marcos A. Kiwi |
Strength of two data encryption standard implementations under timing attacks. |
ACM Trans. Inf. Syst. Secur. |
1999 |
DBLP DOI BibTeX RDF |
cryptography, cryptanalysis, data encryption standard, timing attack |
11 | Markus Michels, Markus Stadler, Hung-Min Sun |
On the Security of Some Variants of the RSA Signature Scheme. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
RSA variants, cryptanalysis, digital signature schemes |
11 | Tor Helleseth, Daniel Sandberg |
Some Power Mappings with Low Differential Uniformity. |
Appl. Algebra Eng. Commun. Comput. |
1997 |
DBLP DOI BibTeX RDF |
Planar permutation polynomials, Sequences with good correlations, Differential cryptanalysis |
11 | Thomas R. Cain, Alan T. Sherman |
How to Break Gifford's Cipher (extended abstract). |
CCS |
1994 |
DBLP DOI BibTeX RDF |
Boston Community Information System, Gifford's cipher, algorithms over finite fields, linear algebra over GF(2), primary rational canonical form, similar matrices, cryptography, cryptanalysis, stream ciphers, linear feedback shift registers, correlation attack, matrix decompositions, cryptology, similarity transformations, filter generators |
11 | Thomas Siegenthaler |
Decrypting a Class of Stream Ciphers Using Ciphertext Only. |
IEEE Trans. Computers |
1985 |
DBLP DOI BibTeX RDF |
pseudonoise generator, exhaustive trials, cryptanalysis, Correlation |
11 | Dennie Van Tassel |
Advanced cryptographic techniques for computer. |
Commun. ACM |
1969 |
DBLP DOI BibTeX RDF |
confidential information processing, secrecy systems, cryptanalysis, security systems, ciphers, cryptographic |
11 | Pu Sun, Fu Song, Yuqi Chen 0001, Taolue Chen |
EasyBC: A Cryptography-Specific Language for Security Analysis of Block Ciphers against Differential Cryptanalysis. |
Proc. ACM Program. Lang. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Dolendro Singh Laiphrakpam, Rohit Thingbaijam, Ripon Patgiri, Motilal Singh Khoirom |
Cryptanalysis of cross-coupled chaotic maps multi-image encryption scheme. |
J. Inf. Secur. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Heping Wen, Yiting Lin |
Cryptanalysis of an image encryption algorithm using quantum chaotic map and DNA coding. |
Expert Syst. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Murat Burhan Ilter, Ali Aydin Selçuk |
MILP modeling of matrix multiplication: cryptanalysis of KLEIN and PRINCE. |
Turkish J. Electr. Eng. Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Eugen Antal |
The origin of military cryptanalysis in Czechoslovakia. |
Cryptologia |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Ahmad Kabil, Heba Aslan, Marianne Azer |
Cryptanalysis of Two Conditional Privacy Preserving Authentication Schemes for Vehicular Ad Hoc Networks. |
Cryptogr. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Nasratullah Ghafoori, Atsuko Miyaji |
Higher-Order Differential-Linear Cryptanalysis of ChaCha Stream Cipher. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Atiyeh Mirzaie, Siavash Ahmadi, Mohammad Reza Aref |
Integral Cryptanalysis of Round-Reduced Shadow-32 for IoT Nodes. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Xiaodong Yang 0006, Wenjia Wang, Tian Tian, Caifen Wang |
Cryptanalysis and Improvement of a Blockchain-Based Certificateless Signature for IIoT Devices. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Samir Hodzic, Arnab Roy 0005, Elena Andreeva 0001 |
Quantum cryptanalysis of Farfalle and (generalised) key-alternating Feistel networks. |
Des. Codes Cryptogr. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Aaradh Nepal, Francesco Perono Cacciafoco |
Minoan Cryptanalysis: Computational Approaches to Deciphering Linear A and Assessing Its Connections with Language Families from the Mediterranean and the Black Sea Areas. |
Inf. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Shan Shan, Bo Zhang 0020 |
Cryptanalysis of a Certificateless Signcryption Scheme for Wireless Sensor Networks in Ubiquitous Healthcare Systems. |
Wirel. Pers. Commun. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Loïc Bidoux, Pierre Briaud, Maxime Bros, Philippe Gaborit |
RQC Revisited and More Cryptanalysis for Rank-Based Cryptography. |
IEEE Trans. Inf. Theory |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Zakaria Tolba |
Cryptanalysis and improvement of multimodal data encryption by machine-learning-based system. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Santosh Kumar Ravva, K. L. N. C. Prakash, Sureddi R. M. Krishna |
Cryptanalysis of RSA with composed decryption exponent with few most significant bits of one of the primes. |
J. Comput. Virol. Hacking Tech. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Weixi Zheng, Liu Zhang, Zilong Wang |
Theoretical Explanation and Improvement of Deep Learning-aided Cryptanalysis. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
11 | Hoeteck Wee, David J. Wu 0001 |
Lattice-Based Functional Commitments: Fast Verification and Cryptanalysis. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
11 | Manjeet Kaur, Tarun Yadav, Manoj Kumar, Dhananjoy Dey |
Differential Cryptanalysis of a Lightweight Block Cipher LELBC. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
11 | Peigen Li, Jintai Ding |
Cryptanalysis of the SNOVA signature scheme. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
11 | Tim Beyne, Addie Neyt |
Note on the cryptanalysis of Speedy. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
11 | Emanuele Bellini 0002, Alessandro De Piccoli, Mattia Formenti, David Gérault, Paul Huynh, Simone Pelizzola, Sergio Polese, Andrea Visconti |
Differential cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
11 | Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia |
Improved Differential Meet-In-The-Middle Cryptanalysis. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
11 | Charles Bouillaguet, Julia Sauvage |
Preliminary Cryptanalysis of the Biscuit Signature Scheme. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
11 | Valerie Gilchrist, Laurane Marco, Christophe Petit 0001, Gang Tang |
Solving the Tensor Isomorphism Problem for special orbits with low rank points: Cryptanalysis and repair of an Asiacrypt 2023 commitment scheme. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
11 | Sidoine Juicielle Kambiré, Guy Mobouale Wamba, Abiodoun Clement Hounkpevi, Daniel Tieudjo, Djiby Sow |
Cryptanalysis of signature schemes based on the root extraction problem over braid group. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
11 | Mahender Kumar |
Cryptanalysis of Secure and Lightweight Conditional Privacy-Preserving Authentication for Securing Traffic Emergency Messages in VANETs. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
11 | Guilhem Mureau, Alice Pellet-Mary, Heorhii Pliatsok, Alexandre Wallet |
Cryptanalysis of rank-2 module-LIP in Totally Real Number Fields. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
11 | Katharina Koschatko, Reinhard Lüftenegger, Christian Rechberger |
Exploring the Six Worlds of Gröbner Basis Cryptanalysis: Application to Anemoi. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
11 | Mathieu Degré, Patrick Derbez, Lucie Lahaye, André Schrottenloher |
New Models for the Cryptanalysis of ASCON. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
11 | Haiyan Sun, Chaoyang Li, Jianwei Zhang, Shujun Liang, Wanwei Huang |
Cryptanalysis and Improvement of Several Identity-Based Authenticated and Pairing-Free Key Agreement Protocols for IoT Applications. |
Sensors |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Himadry Sekhar Roy, Prakash Dey, Sandip Kumar Mondal, Avishek Adhikari |
Cryptanalysis of full round FUTURE with multiple biclique structures. |
Peer Peer Netw. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Sadegh Sadeghi, Nasour Bagheri |
Cryptanalysis of DBST, a lightweight block cipher. |
Frontiers Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Le He, Hongbo Yu |
Cryptanalysis of Reduced-Round SipHash. |
Comput. J. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Yin Lv, Danping Shi, Lei Hu, Zihui Guo, Yi Guo, Caibing Wang |
Improved Linear Cryptanalysis of Block Cipher BORON. |
Comput. J. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Chunning Zhou, Wentao Zhang, Weiwei Cao |
A New Approach of Evaluating the Security Against Differential and Linear Cryptanalysis and Its Applications to Serpent, NOEKEON and ASCON. |
Comput. J. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Hosein Hadipour, Yosuke Todo |
Cryptanalysis of QARMAv2. |
IACR Trans. Symmetric Cryptol. |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Gaëtan Leurent |
Symmetric Cryptanalysis Beyond Primitives. |
|
2024 |
RDF |
|
11 | Cihangir Tezcan |
GPU-Based Brute Force Cryptanalysis of KLEIN. |
ICISSP |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Xiuhan Lin, Moeto Suzuki, Shiduo Zhang, Thomas Espitau, Yang Yu 0008, Mehdi Tibouchi, Masayuki Abe |
Cryptanalysis of the Peregrine Lattice-Based Signature Scheme. |
Public Key Cryptography (1) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Max Cartor, Ryann Cartor, Hiroki Furue, Daniel Smith-Tone |
Improved Cryptanalysis of HFERP. |
Public Key Cryptography (1) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Zahra Ahmadian, Akram Khalesi, Dounia M'foukh, Hossein Moghimi, María Naya-Plasencia |
Improved Differential Meet-in-the-Middle Cryptanalysis. |
EUROCRYPT (1) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Guilhem Mureau, Alice Pellet-Mary, Georgii Pliatsok, Alexandre Wallet |
Cryptanalysis of Rank-2 Module-LIP in Totally Real Number Fields. |
EUROCRYPT (6) |
2024 |
DBLP DOI BibTeX RDF |
|
11 | Ahmed S. Shatnawi, Mahmoud M. Almazari, Zakarea AlShara, Eyad Taqieddin, Dheya Mustafa |
RSA cryptanalysis - Fermat factorization exact bound and the role of integer sequences in factorization problem. |
J. Inf. Secur. Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Yanbin Xu, Yonglin Hao, Mingxing Wang |
Revisit two memoryless state-recovery cryptanalysis methods on A5/1. |
IET Inf. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Ayoub Otmani, Christophe Petit 0001, Mehdi Tibouchi |
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals. |
IET Inf. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jiajie Liu, Bing Sun, Chao Li |
Design and cryptanalysis of a new iterative structure. |
IET Inf. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Jun Liu, Dachao Wang, Yupu Hu, Jie Chen, Baocang Wang |
Improved integral cryptanalysis of SPNbox in digital rights management systems. |
IET Inf. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Kenneth J. Bures |
Cracking PURPLE: the identification of homologs in the cryptanalysis of the Angooki Taipu B cipher machine. |
Cryptologia |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Olaf Ostwald, Frode Weierud |
Modern cryptanalysis of the Truppenschlüssel. |
Cryptologia |
2023 |
DBLP DOI BibTeX RDF |
|
11 | Leonardo Campanelli |
A statistical cryptanalysis of the Beale ciphers. |
Cryptologia |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 4217 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|