The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cryptanalysis with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1982 (17) 1983-1985 (15) 1986-1988 (17) 1989-1990 (17) 1991 (19) 1992-1993 (36) 1994 (34) 1995 (18) 1996 (26) 1997 (34) 1998 (48) 1999 (42) 2000 (56) 2001 (80) 2002 (87) 2003 (105) 2004 (111) 2005 (171) 2006 (169) 2007 (181) 2008 (221) 2009 (204) 2010 (136) 2011 (174) 2012 (165) 2013 (150) 2014 (167) 2015 (202) 2016 (195) 2017 (159) 2018 (177) 2019 (39)
Publication types (Num. hits)
article(1562) book(6) incollection(21) inproceedings(1629) phdthesis(54)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2108 occurrences of 562 keywords

Results
Found 3272 publication records. Showing 3272 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
103David A. Wagner 0001 Towards a Unifying View of Block Cipher Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
97Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis
94Xuejia Lai, James L. Massey, Sean Murphy Markov Ciphers and Differential Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
88Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Square-multiply exponentiation, Cryptography, Side channel attack, Exponentiation, Timing attack, Power analysis attack, Physical cryptanalysis, Hardware fault cryptanalysis
79Thomas Baignères, Pascal Junod, Serge Vaudenay How Far Can We Go Beyond Linear Cryptanalysis? Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF statistical cryptanalysis, Block ciphers, linear cryptanalysis
79Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF fault infective CRT, fault tolerance, cryptography, fault detection, side channel attack, factorization, Chinese Remainder Theorem (CRT), residue number system, physical cryptanalysis, hardware fault cryptanalysis, denial of service attack
79Makoto Sugita, Kazukuni Kobara, Hideki Imai Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Block Cipher Camellia, Truncated Differential Cryptanalysis, Impossible Differential Cryptanalysis
79Carlo Harpes, Gerhard G. Kramer, James L. Massey A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF piling-up lemma, SAFER K-64, differential cryptanalysis, Linear cryptanalysis, IDEA
77Raphael C.-W. Phan, Sung-Ming Yen Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attacks and countermeasures in hardware and software, cryptanalysis, Advanced Encryption Standard, side-channel attacks, fault attacks
75Eli Biham On Matsui's Linear Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
71Meiqin Wang, Jorge Nakahara Jr., Yue Sun Cryptanalysis of the Full MMB Block Cipher. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MMB block cipher, square cryptanalysis, differential cryptanalysis, modular multiplication, linear cryptanalysis
69Ali Aydin Selçuk On Probability of Success in Linear and Differential Cryptanalysis. Search on Bibsonomy J. Cryptology The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Success probability, Block ciphers, Differential cryptanalysis, Linear cryptanalysis, Order statistics
69Nicolas Courtois The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF interpolation attack on block ciphers, fractional transformations, homographic functions, generalised linear cryptanalysis, bi-linear cryptanalysis, Block ciphers, AES, Rijndael, Feistel ciphers, multivariate equations
69Pascal Junod, Serge Vaudenay Optimal Key Ranking Procedures in a Statistical Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key ranking, statistical cryptanalysis, Neyman-Pearson lemma, linear cryptanalysis
66Sung-Ming Yen Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
66Seokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Dong Hyeon Cheon, Inho Cho Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
60Jie Chen, YuPu Hu, Yueyu Zhang Impossible differential cryptanalysis of Advanced Encryption Standard. Search on Bibsonomy Science in China Series F: Information Sciences The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, block cipher, advanced encryption standard, impossible differential cryptanalysis
60Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multiple linear cryptanalysis, Advanced Encryption Standard, branch-and-bound, linear cryptanalysis, linear approximations, Serpent
59Lars R. Knudsen, Willi Meier Improved Differential Attacks on RC5. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Cipher, Differential cryptanalysis, Weak keys
58Raphael C.-W. Phan, Mohammad Umar Siddiqi A Framework for Describing Block Cipher Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF framework, cryptanalysis, generalization, Encryption, block ciphers, distinguishers
58Goce Jakimoski, Yvo Desmedt Related-Key Differential Cryptanalysis of 192-bit Key AES Variants. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF related keys, Markov ciphers, Advanced Encryption Standard, Differential cryptanalysis
58Thomas Pornin, Jacques Stern Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF A5/1, FPGA, cryptanalysis, stream cipher, GSM, trade-off
57Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Security Weaknesses of Certain Broadcast Encryption Schemes. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF time-memory-data trade-off, cryptanalysis, key management, broadcast encryption
57Beomsik Song, Huaxiong Wang, Jennifer Seberry A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Substitution-Permutation(SP) Networks, Subtitution Distance, Cryptanalysis, Rijndael
57Sébastien Kunz-Jacques, Frédéric Muller New Improvements of Davies-Murphy Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Helena Handschuh, Bart Preneel Blind Differential Cryptanalysis for Enhanced Power Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF combined cryptanalysis, blind cryptanalysis, side channel attacks, power analysis, differential cryptanalysis, Hamming weights
51Debra L. Cook, Moti Yung, Angelos D. Keromytis Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security analysis, differential cryptanalysis, linear cryptanalysis
51Nicolas Courtois, Gregory V. Bard Algebraic Cryptanalysis of the Data Encryption Standard. Search on Bibsonomy IMA Int. Conf. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF s5DES, solving overdefined and sparse systems of multivariate equations, ElimLin algorithm, Gröbner bases, logical cryptanalysis, block ciphers, AES, DES, SAT solvers, algebraic cryptanalysis
51Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MISTY, Provable Security, Differential Cryptanalysis, Linear Cryptanalysis, RC6, Feistel Network
51Liam Keliher Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SPN, MELP, MEDP, KMT2, KMT2-DC, AES, provable security, differential cryptanalysis, Rijndael, linear cryptanalysis
51Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee Differential Cryptanalysis of TEA and XTEA. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF TEA, XTEA, truncated differential cryptanalysis, Block cipher, differential cryptanalysis
51Alex Biryukov, Adi Shamir Structural Cryptanalysis of SASAS. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Structural cryptanalysis, substitution permutation networks, substitution affine networks, Cryptanalysis, block ciphers, Rijndael
51Eli Biham, Alex Biryukov, Adi Shamir Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Skipjack, Cryptanalysis, Differential cryptanalysis, Impossible differentials
50Thomas Baignères, Serge Vaudenay Proving the Security of AES Substitution-Permutation Network. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Linear Hulls, Provable Security, Differential Cryptanalysis, Differentials, Linear Cryptanalysis
50Pascal Junod On the Optimality of Linear, Differential, and Sequential Distinguishers. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Differential cryptanalysis, Linear Cryptanalysis, Distinguishers, Statistical Hypothesis Testing
49Dmitry Khovratovich Cryptanalysis of Hash Functions with Structures. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF truncated differentials, Grindahl, Fugue, cryptanalysis, hash functions, structures, SHA-3
49Waseem Shahzad, Abdul Basit Siddiqui, Farrukh Aslam Khan Cryptanalysis of four-rounded DES using binary particleswarm optimization. Search on Bibsonomy GECCO (Companion) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ga, pso, cryptanalysis, des, fitness function
49Thomas Roche, Roland Gillard, Jean-Louis Roch Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipher. Search on Bibsonomy MCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Provable security, Impossible Differential cryptanalysis, Symmetric ciphers
49Jun Song 0003, Huanguo Zhang, Qingshu Meng, Zhang-yi Wang Cryptanalysis of Two-Round DES Using Genetic Algorithms. Search on Bibsonomy ISICA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF two-round DES, known plaintext attack, genetic algorithm, cryptanalysis, fitness function
49Tanmoy Kanti Das, Jianying Zhou 0001 Cryptanalysis of Barni et al. Watermarking Scheme. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Watermark Recovery, Copy Attack, Cryptanalysis, Wavelet Transform
49Mohamed Amine Garici, Habiba Drias Cryptanalysis of Substitution Ciphers Using Scatter Search. Search on Bibsonomy IWINAC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF automated cryptanalysis, substitution ciphers, genetic algorithm, heuristic search, optimization problem, scatter search, evolutionary approach
49Tanmoy Kanti Das, Subhamoy Maitra Cryptanalysis of "Wavelet Tree Quantization" Watermarking Scheme. Search on Bibsonomy IWDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cryptanalysis, Wavelet Transform, Information Security, Digital Watermarking, Multimedia Systems
49Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF FPGA, Cryptography, DES, linear cryptanalysis, efficient implementations
49Tanmoy Kanti Das, Subhamoy Maitra Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cryptanalysis, Discrete Cosine Transform, Digital Watermarking, Subset Sum
49Lars R. Knudsen, David A. Wagner 0001 Integral Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MISTY, integrals, Cryptanalysis, block ciphers
49Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari Linear Cryptanalysis of Bluetooth Stream Cipher. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF linear correlations, iterative probabilistic decoding, reinitialization, Linear cryptanalysis
48Gildas Avoine, Pascal Junod, Philippe Oechslin Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptanalysis, precomputation, Time-memory trade-off
48Miodrag J. Mihaljevic, Hideki Imai The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF overdefined systems of equations, hypotheses testing, cryptanalysis, stream ciphers, algebraic attacks, decimation
48Philippe Oechslin Making a Faster Cryptanalytic Time-Memory Trade-Off. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF fixed plaintext, cryptanalysis, precomputation, Time-memory trade-off
47Eli Biham New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47N. Nalini, G. Raghavendra Rao Cryptanalysis of Block Ciphers via Improved Simulated Annealing Technique. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Eli Biham, Orr Dunkelman, Nathan Keller Enhancing Differential-Linear Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
47Carlo Harpes, James L. Massey Partitioning Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
47Luke O'Connor, Jovan Dj. Golic A Unified Markow Approach to Differential and Linear Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
47Toshio Tokita, Tohru Sorimachi, Mitsuru Matsui Linear Cryptanalysis of LOKI and s2DES. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
47Gustavus J. Simmons Cryptanalysis and Protocol Failures (abstract). Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
41Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Substitution-permutation networks, Branch number, Independent variables, Cryptography, AES, Differential cryptanalysis, Linear cryptanalysis, ARIA
41Luca Breveglieri, Alessandra Cherubini, Marco Macchetti On the Generalized Linear Equivalence of Functions Over Finite Fields. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF linear equivalence, APN functions, Boolean functions, differential cryptanalysis, S-boxes, linear cryptanalysis
41Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha Permanent Fault Attack on the Parameters of RSA with CRT. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Computational fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis
41Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha Hardware Fault Attackon RSA with CRT Revisited. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis
41Dong Hyeon Cheon, Sangjin Lee, Jong In Lim, Sung Jae Lee New Block Cipher DONUT Using Pairwise Perfect Decorrelation. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Differential Cryptanalysis (DC), Linear Cryptanalysis (LC), Block cipher, Decorrelation
41Dong Hyeon Cheon, Seokhie Hong, Sangjin Lee, Sung Jae Lee, Kyung Hwan Park, Seonhee Yoon Difference Distribution Attack on DONUT and Improved DONUT. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF DONUT, Differential Cryptanalysis(DC), Linear Cryptanalysis(LC), Difference Distribution Attack(DDA), Decorrelation
41Kazumaro Aoki On Maximum Non-averaged Differential Probability. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF maximum average of differential probability, linear hull, maximum average of linear probability, maximum non-averaged differential probability, maximum non-averaged linear probability, DES-like cipher, Differential cryptanalysis, differential, linear cryptanalysis
41Philip Hawkes Differential-Linear Weak Key Classes of IDEA. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF differential-linear cryptanalysis, related-key cryptanalysis, IDEA, weak keys
40Waseem Shahzad, Abdul Basit Siddiqui, Farrukh Aslam Khan Cryptanalysis of four-rounded DES using binary particle swarm optimization. Search on Bibsonomy GECCO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptanalysis, DES, GA, PSO, fitness function
40Elad Barkan, Eli Biham, Nathan Keller Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. Search on Bibsonomy J. Cryptology The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ciphertext-only, SIM, A5/2, A5/1, Cryptanalysis, SMS, GSM, GPRS, Cellular
40Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MISTY1, Block cipher, Impossible differential cryptanalysis, Camellia
40Jun Song 0003, Fan Yang, Maocai Wang, Huanguo Zhang Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm. Search on Bibsonomy ISICA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intelligent computing, fitness evaluation weight mode, cryptanalysis, SAGA
40Fan Yang, Jun Song 0003, Huanguo Zhang Quantitative Cryptanalysis of Six-Round DES Using Evolutionary Algorithms. Search on Bibsonomy ISICA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Evolutionary cryptanalysis, Likelihood estimation, Evolutionary computation, Linear approximation
40Wenling Wu, Wentao Zhang, Dengguo Feng Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF block cipher, time complexity, data complexity, impossible differential cryptanalysis, ARIA, Camellia
40Haijian Zhou, Ping Luo, Daoshun Wang, Yiqi Dai Cryptanalysis of General Lu-Lee Type Systems. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Lu-Lee type systems, cryptanalysis, lattice reduction
40Louis Goubin, Jean-Michel Masereel, Michaël Quisquater Cryptanalysis of White Box DES Implementations. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, block cipher, DES, Obfuscation, symmetric cryptography
40Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF White-Box Cryptography, Cryptanalysis, DES, Data Encryption Standard, Obfuscation
40Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk Cryptanalysis of FORK-256. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FORK-256, micro-collisions, cryptanalysis, hash functions
40Alexander Maximov On Large Distributions for Linear Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF large distributions, pseudo-linear functions, approximations, Linear cryptanalysis, complexity reduction
40Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater Improving the Time Complexity of Matsui's Linear Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fast Fourier Transform, block ciphers, linear cryptanalysis
40Gwenaëlle Martinet, Guillaume Poupard, Philippe Sola Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones. Search on Bibsonomy Financial Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF partially blind signature, Cryptanalysis, electronic cash
40Yaniv Shaked, Avishai Wool Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream cipher, Bluetooth, BDD
40Werner Schindler, Kerstin Lemke, Christof Paar A Stochastic Model for Differential Side Channel Cryptanalysis. Search on Bibsonomy CHES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Differential Side Channel Cryptanalysis, Minimum Principle, Maximum Likelihood Principle, Stochastic Model, DPA, Power Analysis, DEMA, Template Attack, Electromagnetic Analysis
40Ludovic Perret A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Isomorphism of Polynomials with One Secret (IP1S), Polynomial Linear Equivalence (PLE), Cryptanalysis, Jacobian Matrix
40Simon R. Blackburn, Kenneth G. Paterson Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF cryptanalysis, MAC, Message authentication, matrix groups, birthday paradox
40Tanmoy Kanti Das, Jianying Zhou 0001, Subhamoy Maitra Cryptanalysis of a Wavelet Based Watermarking Scheme. Search on Bibsonomy IWDW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cryptanalysis, Wavelet Transform, Correlation, Digital Watermarking
40Craig Gentry, Michael Szydlo Cryptanalysis of the Revised NTRU Signature Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF NSS, NTRUSign, Orthogonal Lattice, Cyclotomic Integer, Galois Congruence, Cryptanalysis, Signature Scheme, Lattice Reduction, NTRU
40Anne Canteaut, Marion Videau Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF higher order differential cryptanalysis, Boolean functions, Block ciphers, nonlinearity
40Henri Gilbert, Marine Minier Cryptanalysis of SFLASH. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF asymmetric signature, cryptanalysis, multivariate polynomials, SFLASH
40Nicolas Courtois, Josef Pieprzyk Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MQ problem, overdefined systems of multivariate equations, Gröbner bases, sparse multivariate polynomials, Multivariate Cryptanalysis, Block ciphers, AES, Rijndael, Square, Camellia, Serpent, XL algorithm, multivariate quadratic equations
40John Kelsey, Bruce Schneier, David A. Wagner 0001, Chris Hall Side Channel Cryptanalysis of Product Ciphers. Search on Bibsonomy ESORICS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF product ciphers, cryptanalysis, timing attacks, side channels
40Alex Biryukov, Eyal Kushilevitz Improved Cryptanalysis of RC5. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF RGS, Block ciphers, differential cryptanalysis
40Adi Shamir Visual Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF visual computation, bit slice computation, parallel computers, Cryptanalysis, quantum computers, DNA computers, photography
40Thomas Jakobson Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF interpolation attack, non-linear relations, Sudan's algorithm, Cryptanalysis, block cipher, Reed-Solomon codes
40Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cryptanalysis, public key cryptosystem, finite automaton
39Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. Search on Bibsonomy AAECC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF overdefined systems of nonlinear equations, state transition matrix, cryptanalysis, stream ciphers, decoding, LFSRs, algebraic attacks, fast correlation attack, decimation, keystream generators
39Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen On the Collision Resistance of RIPEMD-160. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF RIPEMD-160, low-weight codewords, cryptanalysis, hash function, collision attack, differential attack
39Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Exploiting Coding Theory for Collision Attacks on SHA-1. Search on Bibsonomy IMA Int. Conf. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF low-weight vector, cryptanalysis, hash function, collision, Linear code, SHA-1
39Phong Q. Nguyen, Damien Stehlé Floating-Point LLL Revisited. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF L3, Lattice Reduction, LLL, Public-Key Cryptanalysis
39Paul Camion, Miodrag J. Mihaljevic, Hideki Imai Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF linear feedback shift registers over GF(), nonlinear combination generator, cryptanalysis, resilient functions, keystream generators
39Luke O'Connor On the Distribution of Characteristics in Bijective Mappings. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF iterated mapping, product cipher, Differential cryptanalysis
39Luke O'Connor On the Distribution of Characteristics in Composite Permutations. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF iterated mapping, product cipher, Differential cryptanalysis
38Kenji Ohkuma Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Guilhem Castagnos, Fabien Laguillaumie On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Polynomial time total break, quadratic decryption, NICE cryptosystems, imaginary quadratic field-based cryptography
Displaying result #1 - #100 of 3272 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license