|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2108 occurrences of 562 keywords
|
|
|
Results
Found 4217 publication records. Showing 4217 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
96 | David A. Wagner 0001 |
Towards a Unifying View of Block Cipher Cryptanalysis. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
|
92 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis |
87 | Xuejia Lai, James L. Massey, Sean Murphy |
Markov Ciphers and Differential Cryptanalysis. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
84 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Square-multiply exponentiation, Cryptography, Side channel attack, Exponentiation, Timing attack, Power analysis attack, Physical cryptanalysis, Hardware fault cryptanalysis |
75 | Thomas Baignères, Pascal Junod, Serge Vaudenay |
How Far Can We Go Beyond Linear Cryptanalysis? |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
statistical cryptanalysis, Block ciphers, linear cryptanalysis |
75 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
fault infective CRT, fault tolerance, cryptography, fault detection, side channel attack, factorization, Chinese Remainder Theorem (CRT), residue number system, physical cryptanalysis, hardware fault cryptanalysis, denial of service attack |
75 | Makoto Sugita, Kazukuni Kobara, Hideki Imai |
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
Block Cipher Camellia, Truncated Differential Cryptanalysis, Impossible Differential Cryptanalysis |
75 | Carlo Harpes, Gerhard Kramer, James L. Massey |
A Generalization of Linear Cryptanalysis and the Applicability of Matsui's Piling-Up Lemma. |
EUROCRYPT |
1995 |
DBLP DOI BibTeX RDF |
piling-up lemma, SAFER K-64, differential cryptanalysis, Linear cryptanalysis, IDEA |
73 | Raphael C.-W. Phan, Sung-Ming Yen |
Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. |
CARDIS |
2006 |
DBLP DOI BibTeX RDF |
Attacks and countermeasures in hardware and software, cryptanalysis, Advanced Encryption Standard, side-channel attacks, fault attacks |
70 | Eli Biham |
On Matsui's Linear Cryptanalysis. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
69 | Meiqin Wang, Jorge Nakahara Jr., Yue Sun |
Cryptanalysis of the Full MMB Block Cipher. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
MMB block cipher, square cryptanalysis, differential cryptanalysis, modular multiplication, linear cryptanalysis |
67 | Ali Aydin Selçuk |
On Probability of Success in Linear and Differential Cryptanalysis. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Success probability, Block ciphers, Differential cryptanalysis, Linear cryptanalysis, Order statistics |
67 | Nicolas T. Courtois |
The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
interpolation attack on block ciphers, fractional transformations, homographic functions, generalised linear cryptanalysis, bi-linear cryptanalysis, Block ciphers, AES, Rijndael, Feistel ciphers, multivariate equations |
67 | Pascal Junod, Serge Vaudenay |
Optimal Key Ranking Procedures in a Statistical Cryptanalysis. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
Key ranking, statistical cryptanalysis, Neyman-Pearson lemma, linear cryptanalysis |
62 | Sung-Ming Yen |
Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
62 | Seokhie Hong, Sangjin Lee 0002, Jongin Lim 0001, Jaechul Sung, Dong Hyeon Cheon, Inho Cho |
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
|
58 | Jie Chen 0055, YuPu Hu, Yueyu Zhang |
Impossible differential cryptanalysis of Advanced Encryption Standard. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, block cipher, advanced encryption standard, impossible differential cryptanalysis |
58 | Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater |
Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
multiple linear cryptanalysis, Advanced Encryption Standard, branch-and-bound, linear cryptanalysis, linear approximations, Serpent |
56 | Lars R. Knudsen, Willi Meier |
Improved Differential Attacks on RC5. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Cipher, Differential cryptanalysis, Weak keys |
56 | Raphael C.-W. Phan, Mohammad Umar Siddiqi |
A Framework for Describing Block Cipher Cryptanalysis. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
framework, cryptanalysis, generalization, Encryption, block ciphers, distinguishers |
56 | Goce Jakimoski, Yvo Desmedt |
Related-Key Differential Cryptanalysis of 192-bit Key AES Variants. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
related keys, Markov ciphers, Advanced Encryption Standard, Differential cryptanalysis |
56 | Thomas Pornin, Jacques Stern |
Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
A5/1, FPGA, cryptanalysis, stream cipher, GSM, trade-off |
54 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Security Weaknesses of Certain Broadcast Encryption Schemes. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
time-memory-data trade-off, cryptanalysis, key management, broadcast encryption |
54 | Beomsik Song, Huaxiong Wang, Jennifer Seberry |
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Substitution-Permutation(SP) Networks, Subtitution Distance, Cryptanalysis, Rijndael |
53 | Sébastien Kunz-Jacques, Frédéric Muller |
New Improvements of Davies-Murphy Cryptanalysis. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Helena Handschuh, Bart Preneel |
Blind Differential Cryptanalysis for Enhanced Power Attacks. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
combined cryptanalysis, blind cryptanalysis, side channel attacks, power analysis, differential cryptanalysis, Hamming weights |
50 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
security analysis, differential cryptanalysis, linear cryptanalysis |
50 | Nicolas T. Courtois, Gregory V. Bard |
Algebraic Cryptanalysis of the Data Encryption Standard. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
s5DES, solving overdefined and sparse systems of multivariate equations, ElimLin algorithm, Gröbner bases, logical cryptanalysis, block ciphers, AES, DES, SAT solvers, algebraic cryptanalysis |
50 | Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
MISTY, Provable Security, Differential Cryptanalysis, Linear Cryptanalysis, RC6, Feistel Network |
50 | Liam Keliher |
Refined Analysis of Bounds Related to Linear and Differential Cryptanalysis for the AES. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
SPN, MELP, MEDP, KMT2, KMT2-DC, AES, provable security, differential cryptanalysis, Rijndael, linear cryptanalysis |
50 | Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee 0002 |
Differential Cryptanalysis of TEA and XTEA. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
TEA, XTEA, truncated differential cryptanalysis, Block cipher, differential cryptanalysis |
50 | Alex Biryukov, Adi Shamir |
Structural Cryptanalysis of SASAS. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
Structural cryptanalysis, substitution permutation networks, substitution affine networks, Cryptanalysis, block ciphers, Rijndael |
50 | Eli Biham, Alex Biryukov, Adi Shamir |
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
Skipjack, Cryptanalysis, Differential cryptanalysis, Impossible differentials |
48 | Thomas Baignères, Serge Vaudenay |
Proving the Security of AES Substitution-Permutation Network. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Linear Hulls, Provable Security, Differential Cryptanalysis, Differentials, Linear Cryptanalysis |
48 | Pascal Junod |
On the Optimality of Linear, Differential, and Sequential Distinguishers. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Differential cryptanalysis, Linear Cryptanalysis, Distinguishers, Statistical Hypothesis Testing |
47 | Dmitry Khovratovich |
Cryptanalysis of Hash Functions with Structures. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
truncated differentials, Grindahl, Fugue, cryptanalysis, hash functions, structures, SHA-3 |
47 | Waseem Shahzad, Abdul Basit Siddiqui, Farrukh Aslam Khan |
Cryptanalysis of four-rounded DES using binary particleswarm optimization. |
GECCO (Companion) |
2009 |
DBLP DOI BibTeX RDF |
ga, pso, cryptanalysis, des, fitness function |
47 | Thomas Roche, Roland Gillard, Jean-Louis Roch |
Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipher. |
MCO |
2008 |
DBLP DOI BibTeX RDF |
Provable security, Impossible Differential cryptanalysis, Symmetric ciphers |
47 | Jun Song 0003, Huanguo Zhang, Qingshu Meng, Zhang-yi Wang |
Cryptanalysis of Two-Round DES Using Genetic Algorithms. |
ISICA |
2007 |
DBLP DOI BibTeX RDF |
two-round DES, known plaintext attack, genetic algorithm, cryptanalysis, fitness function |
47 | Mohamed Amine Garici, Habiba Drias |
Cryptanalysis of Substitution Ciphers Using Scatter Search. |
IWINAC (2) |
2005 |
DBLP DOI BibTeX RDF |
automated cryptanalysis, substitution ciphers, genetic algorithm, heuristic search, optimization problem, scatter search, evolutionary approach |
47 | Tanmoy Kanti Das, Jianying Zhou 0001 |
Cryptanalysis of Barni et al. Watermarking Scheme. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
Watermark Recovery, Copy Attack, Cryptanalysis, Wavelet Transform |
47 | Tanmoy Kanti Das, Subhamoy Maitra |
Cryptanalysis of "Wavelet Tree Quantization" Watermarking Scheme. |
IWDC |
2004 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Wavelet Transform, Information Security, Digital Watermarking, Multimedia Systems |
47 | Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat |
Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
FPGA, Cryptography, DES, linear cryptanalysis, efficient implementations |
47 | Lars R. Knudsen, David A. Wagner 0001 |
Integral Cryptanalysis. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
MISTY, integrals, Cryptanalysis, block ciphers |
47 | Jovan Dj. Golic, Vittorio Bagini, Guglielmo Morgari |
Linear Cryptanalysis of Bluetooth Stream Cipher. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
linear correlations, iterative probabilistic decoding, reinitialization, Linear cryptanalysis |
47 | Tanmoy Kanti Das, Subhamoy Maitra |
Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Discrete Cosine Transform, Digital Watermarking, Subset Sum |
45 | Gildas Avoine, Pascal Junod, Philippe Oechslin |
Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints. |
INDOCRYPT |
2005 |
DBLP DOI BibTeX RDF |
cryptanalysis, precomputation, Time-memory trade-off |
45 | Miodrag J. Mihaljevic, Hideki Imai |
The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters. |
SCN |
2004 |
DBLP DOI BibTeX RDF |
overdefined systems of equations, hypotheses testing, cryptanalysis, stream ciphers, algebraic attacks, decimation |
45 | Philippe Oechslin |
Making a Faster Cryptanalytic Time-Memory Trade-Off. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
fixed plaintext, cryptanalysis, precomputation, Time-memory trade-off |
45 | Eli Biham |
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
45 | N. Nalini, G. Raghavendra Rao |
Cryptanalysis of Block Ciphers via Improved Simulated Annealing Technique. |
ICIT |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Eli Biham, Orr Dunkelman, Nathan Keller |
Enhancing Differential-Linear Cryptanalysis. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
45 | Carlo Harpes, James L. Massey |
Partitioning Cryptanalysis. |
FSE |
1997 |
DBLP DOI BibTeX RDF |
|
45 | Toshio Tokita, Tohru Sorimachi, Mitsuru Matsui |
Linear Cryptanalysis of LOKI and s2DES. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
45 | Luke O'Connor, Jovan Dj. Golic |
A Unified Markow Approach to Differential and Linear Cryptanalysis. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
45 | Gustavus J. Simmons |
Cryptanalysis and Protocol Failures (abstract). |
CCS |
1993 |
DBLP DOI BibTeX RDF |
|
39 | Luca Breveglieri, Alessandra Cherubini, Marco Macchetti |
On the Generalized Linear Equivalence of Functions Over Finite Fields. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
linear equivalence, APN functions, Boolean functions, differential cryptanalysis, S-boxes, linear cryptanalysis |
39 | Hong-Su Cho, Soo Hak Sung, Daesung Kwon, Jung-Keun Lee, Jung Hwan Song, Jongin Lim 0001 |
New Method for Bounding the Maximum Differential Probability for SPNs and ARIA. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
Substitution-permutation networks, Branch number, Independent variables, Cryptography, AES, Differential cryptanalysis, Linear cryptanalysis, ARIA |
39 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Permanent Fault Attack on the Parameters of RSA with CRT. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
Computational fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
39 | Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha |
Hardware Fault Attackon RSA with CRT Revisited. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
Computational fault, Memory access fault, Cryptography, Side channel attack, Factorization, Chinese remainder theorem (CRT), Transient fault, Permanent fault, Physical cryptanalysis, Hardware fault cryptanalysis |
39 | Dong Hyeon Cheon, Seokhie Hong, Sangjin Lee 0002, Sung Jae Lee, Kyung Hwan Park, Seonhee Yoon |
Difference Distribution Attack on DONUT and Improved DONUT. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
DONUT, Differential Cryptanalysis(DC), Linear Cryptanalysis(LC), Difference Distribution Attack(DDA), Decorrelation |
39 | Dong Hyeon Cheon, Sangjin Lee 0002, Jong In Lim 0001, Sung Jae Lee |
New Block Cipher DONUT Using Pairwise Perfect Decorrelation. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
Differential Cryptanalysis (DC), Linear Cryptanalysis (LC), Block cipher, Decorrelation |
39 | Kazumaro Aoki |
On Maximum Non-averaged Differential Probability. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
maximum average of differential probability, linear hull, maximum average of linear probability, maximum non-averaged differential probability, maximum non-averaged linear probability, DES-like cipher, Differential cryptanalysis, differential, linear cryptanalysis |
39 | Philip Hawkes |
Differential-Linear Weak Key Classes of IDEA. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
differential-linear cryptanalysis, related-key cryptanalysis, IDEA, weak keys |
39 | Waseem Shahzad, Abdul Basit Siddiqui, Farrukh Aslam Khan |
Cryptanalysis of four-rounded DES using binary particle swarm optimization. |
GECCO |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, DES, GA, PSO, fitness function |
39 | Elad Barkan, Eli Biham, Nathan Keller |
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Ciphertext-only, SIM, A5/2, A5/1, Cryptanalysis, SMS, GSM, GPRS, Cellular |
39 | Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman |
Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
MISTY1, Block cipher, Impossible differential cryptanalysis, Camellia |
39 | Jun Song 0003, Fan Yang, Maocai Wang, Huanguo Zhang |
Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm. |
ISICA |
2008 |
DBLP DOI BibTeX RDF |
intelligent computing, fitness evaluation weight mode, cryptanalysis, SAGA |
39 | Fan Yang, Jun Song 0003, Huanguo Zhang |
Quantitative Cryptanalysis of Six-Round DES Using Evolutionary Algorithms. |
ISICA |
2008 |
DBLP DOI BibTeX RDF |
Evolutionary cryptanalysis, Likelihood estimation, Evolutionary computation, Linear approximation |
39 | Wenling Wu, Wentao Zhang, Dengguo Feng |
Impossible Differential Cryptanalysis of Reduced-Round ARIA and Camellia. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
block cipher, time complexity, data complexity, impossible differential cryptanalysis, ARIA, Camellia |
39 | Haijian Zhou, Ping Luo, Daoshun Wang, Yiqi Dai |
Cryptanalysis of General Lu-Lee Type Systems. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Lu-Lee type systems, cryptanalysis, lattice reduction |
39 | Louis Goubin, Jean-Michel Masereel, Michaël Quisquater |
Cryptanalysis of White Box DES Implementations. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, block cipher, DES, Obfuscation, symmetric cryptography |
39 | Brecht Wyseur, Wil Michiels, Paul Gorissen, Bart Preneel |
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
White-Box Cryptography, Cryptanalysis, DES, Data Encryption Standard, Obfuscation |
39 | Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk |
Cryptanalysis of FORK-256. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
FORK-256, micro-collisions, cryptanalysis, hash functions |
39 | Alexander Maximov |
On Large Distributions for Linear Cryptanalysis. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
large distributions, pseudo-linear functions, approximations, Linear cryptanalysis, complexity reduction |
39 | Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater |
Improving the Time Complexity of Matsui's Linear Cryptanalysis. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
Fast Fourier Transform, block ciphers, linear cryptanalysis |
39 | Gwenaëlle Martinet, Guillaume Poupard, Philippe Sola |
Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
partially blind signature, Cryptanalysis, electronic cash |
39 | Yaniv Shaked, Avishai Wool |
Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Stream cipher, Bluetooth, BDD |
39 | Ludovic Perret |
A Fast Cryptanalysis of the Isomorphism of Polynomials with One Secret Problem. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
Isomorphism of Polynomials with One Secret (IP1S), Polynomial Linear Equivalence (PLE), Cryptanalysis, Jacobian Matrix |
39 | Werner Schindler, Kerstin Lemke, Christof Paar |
A Stochastic Model for Differential Side Channel Cryptanalysis. |
CHES |
2005 |
DBLP DOI BibTeX RDF |
Differential Side Channel Cryptanalysis, Minimum Principle, Maximum Likelihood Principle, Stochastic Model, DPA, Power Analysis, DEMA, Template Attack, Electromagnetic Analysis |
39 | Tanmoy Kanti Das, Jianying Zhou 0001, Subhamoy Maitra |
Cryptanalysis of a Wavelet Based Watermarking Scheme. |
IWDW |
2004 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Wavelet Transform, Correlation, Digital Watermarking |
39 | Simon R. Blackburn, Kenneth G. Paterson |
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
cryptanalysis, MAC, Message authentication, matrix groups, birthday paradox |
39 | Nicolas T. Courtois, Josef Pieprzyk |
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
MQ problem, overdefined systems of multivariate equations, Gröbner bases, sparse multivariate polynomials, Multivariate Cryptanalysis, Block ciphers, AES, Rijndael, Square, Camellia, Serpent, XL algorithm, multivariate quadratic equations |
39 | Henri Gilbert, Marine Minier |
Cryptanalysis of SFLASH. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
asymmetric signature, cryptanalysis, multivariate polynomials, SFLASH |
39 | Craig Gentry, Michael Szydlo |
Cryptanalysis of the Revised NTRU Signature Scheme. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
NSS, NTRUSign, Orthogonal Lattice, Cyclotomic Integer, Galois Congruence, Cryptanalysis, Signature Scheme, Lattice Reduction, NTRU |
39 | Anne Canteaut, Marion Videau |
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
higher order differential cryptanalysis, Boolean functions, Block ciphers, nonlinearity |
39 | Zong-Duo Dai, Dingfeng Ye, Kwok-Yan Lam |
Weak Invertibiity of Finite Automata and Cryptanalysis on FAPKC. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
cryptanalysis, public key cryptosystem, finite automaton |
39 | Adi Shamir |
Visual Cryptanalysis. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
visual computation, bit slice computation, parallel computers, Cryptanalysis, quantum computers, DNA computers, photography |
39 | Alex Biryukov, Eyal Kushilevitz |
Improved Cryptanalysis of RC5. |
EUROCRYPT |
1998 |
DBLP DOI BibTeX RDF |
RGS, Block ciphers, differential cryptanalysis |
39 | John Kelsey, Bruce Schneier, David A. Wagner 0001, Chris Hall |
Side Channel Cryptanalysis of Product Ciphers. |
ESORICS |
1998 |
DBLP DOI BibTeX RDF |
product ciphers, cryptanalysis, timing attacks, side channels |
39 | Thomas Jakobson |
Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
interpolation attack, non-linear relations, Sudan's algorithm, Cryptanalysis, block cipher, Reed-Solomon codes |
37 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
A General Formulation of Algebraic and Fast Correlation Attacks Based on Dedicated Sample Decimation. |
AAECC |
2006 |
DBLP DOI BibTeX RDF |
overdefined systems of nonlinear equations, state transition matrix, cryptanalysis, stream ciphers, decoding, LFSRs, algebraic attacks, fast correlation attack, decimation, keystream generators |
37 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
On the Collision Resistance of RIPEMD-160. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
RIPEMD-160, low-weight codewords, cryptanalysis, hash function, collision attack, differential attack |
37 | Phong Q. Nguyen, Damien Stehlé |
Floating-Point LLL Revisited. |
EUROCRYPT |
2005 |
DBLP DOI BibTeX RDF |
L3, Lattice Reduction, LLL, Public-Key Cryptanalysis |
37 | Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Exploiting Coding Theory for Collision Attacks on SHA-1. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
low-weight vector, cryptanalysis, hash function, collision, Linear code, SHA-1 |
37 | Paul Camion, Miodrag J. Mihaljevic, Hideki Imai |
Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q). |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
linear feedback shift registers over GF(), nonlinear combination generator, cryptanalysis, resilient functions, keystream generators |
37 | Luke O'Connor |
On the Distribution of Characteristics in Bijective Mappings. |
EUROCRYPT |
1993 |
DBLP DOI BibTeX RDF |
iterated mapping, product cipher, Differential cryptanalysis |
37 | Luke O'Connor |
On the Distribution of Characteristics in Composite Permutations. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
iterated mapping, product cipher, Differential cryptanalysis |
36 | Kenji Ohkuma |
Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
|
36 | Guilhem Castagnos, Fabien Laguillaumie |
On the Security of Cryptosystems with Quadratic Decryption: The Nicest Cryptanalysis. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Polynomial time total break, quadratic decryption, NICE cryptosystems, imaginary quadratic field-based cryptography |
Displaying result #1 - #100 of 4217 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|