|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 343 occurrences of 160 keywords
|
|
|
Results
Found 574 publication records. Showing 574 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
87 | Hartmut Pohl, Dietrich Cerny |
Enterprise Key Recovery: Vertrauenswürdige Server mit skalierbarer Sicherheit zur Archivierung von Konzelationsschlüsseln. |
Inform. Spektrum |
1999 |
DBLP DOI BibTeX RDF |
Sicherheitsarchitektur, Sicherheitsniveau, Skalierbarkeit, Unternehmen, Verschlüsselung, Electronic commerce, Key recovery, Sicherheit |
69 | Juan Manuel González Nieto, Kapali Viswanathan, Colin Boyd, Andrew J. Clark, Ed Dawson |
Key recovery for the commercial environment. |
Int. J. Inf. Sec. |
2002 |
DBLP DOI BibTeX RDF |
Commercial key recovery, Software key recovery, Key management, Key escrow |
60 | Kanokwan Kanyamee, Chanboon Sathitwiriyawong |
High-Availability Decentralized Multi-Agent Key Recovery System. |
ACIS-ICIS |
2009 |
DBLP DOI BibTeX RDF |
|
56 | Dae-Hee Seo, Im-Yeong Lee, Hee-Un Park |
A Study on Key Recovery Agent Protection Profile Having Composition Function. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Key Recovery Protection Profile, Evaluation Methodology, Common Criteria |
53 | Pierre-Alain Fouque, Gaëtan Leurent, Phong Q. Nguyen |
Full Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
collisions, MD5, key-recovery, HMAC, MD4, NMAC, differential path |
51 | Eu-Jin Goh, Dan Boneh, Benny Pinkas, Philippe Golle |
The Design and Implementation of Protocol-Based Hidden Key Recovery. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
51 | Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
MD5, key-recovery, HMAC, differential attack, MD4, NMAC, near-collision |
46 | Yahya Y. Al-Salqan |
Cryptographic Key Recovery. |
FTDCS |
1997 |
DBLP DOI BibTeX RDF |
|
45 | Konstantinos Rantos, Chris J. Mitchell |
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
interoperability, Key recovery, negotiation protocol |
43 | Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki |
Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
key-dependent S-box, Mir-1, stream cipher, eSTREAM, key recovery attack |
43 | Sung-Ming Yen |
Practical Key Recovery Schemes. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee |
New WAKE Key Recovery Protocol on M-commerce. |
ICWE |
2003 |
DBLP DOI BibTeX RDF |
Authentication, M-Commerce, Key Establishment, Key Recovery |
42 | Yung-Cheng Lee, Chi-Sung Laih |
On the Key Recovery of the Key Escrow System. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
Key Escrow System, social needs, criminal behavior, public cryptographic functions, encryption standard, cryptography, public key cryptography, protection, key recovery, user privacy |
41 | Yoon-Jung Rhee, Tai-Yun Kim |
Practical Solutions to Key Recovery Based on PKI in IP Security. |
SAFECOMP |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Jaechul Sung, Deukjo Hong, Sangjin Lee 0002 |
Key Recovery Attacks on the RMAC, TMAC, and IACBC. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
RMAC, TMAC, XCBC, IACBC, Message Authentication Codes, Modes of Operation, Key Recovery Attacks, CBC-MAC |
39 | Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong |
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
HMAC, Key recovery attack, Second preimage attack, NMAC, HAVAL |
39 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
The Security of Elastic Block Ciphers Against Key-Recovery Attacks. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Variable-length block ciphers, reduction proof, security analysis, key recovery attacks |
39 | Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 |
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
MAC (Message Authentication Code), PMAC, TMAC Variant, Key Recovery Attacks, CBC-MAC, Forgery Attacks |
39 | Adam L. Young, Moti Yung |
A Space Efficient Backdoor in RSA and Its Applications. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Decision Diffie-Hellman, black-box ciphers, twist on elliptic curves, RSA, elliptic curve cryptography, tamper-resistance, Diffie-Hellman, Key recovery, SETUP |
37 | Riddhipratim Basu, Subhamoy Maitra, Goutam Paul 0001, Tanmoy Talukdar |
On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling. |
AAECC |
2009 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Stream Cipher, Filter, Permutation, Sequence, Bias, RC4, Key Recovery |
37 | Leonie Ruth Simpson, Matthew Henricksen |
Improved Cryptanalysis of MAG. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Disting- uisher, MAG Keystream Generator, Cryptography, Stream Ciphers, Key Recovery |
36 | Yanjiang Yang, Feng Bao 0001, Robert H. Deng |
Security Analysis and Improvement of the Global Key Recovery System. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Adam L. Young, Moti Yung |
A Key Recovery System as Secure as Factoring. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
Rabin, Blum integer, pseudosquare, PKCS #1, standard compatibility, RSA, public key cryptography, zero-knowledge, chosen ciphertext security, key recovery, semantic Security, quadratic residue |
31 | Shinyoung Lim, Sangseung Kang, Joo-Chan Sohn |
Modeling of Multiple Agent based Cryptographic Key Recovery Protocol. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
30 | Chong Hee Kim, Pil Joong Lee |
New Key Recovery in WAKE Protocol. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Serge Vaudenay, Martin Vuagnoux |
Passive-Only Key Recovery Attacks on RC4. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
key related attack, cryptanalysis, stream cipher, RC4, WEP |
28 | Helena Handschuh, Bart Preneel |
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Gaoli Wang, Shaohui Wang |
Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
key-recovery, HMAC, second preimage attack, NMAC, HAVAL |
28 | Gerhard Weck |
Key Recovery - Möglichkeiten und Risiken. |
Inform. Spektrum |
1998 |
DBLP DOI BibTeX RDF |
Verschlüsselung, Trust Center, digitale Signaturen, Key Recovery |
27 | Atsuko Miyaji, Yuuki Takano |
On the Success Probability of chi2-attack on RC6. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Chris Steketee, Jaimee Brown, Juan Manuel González Nieto, Paul Montague |
GBD Threshold Cryptography with an Application to RSA Key Recovery. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang |
A Secure Re-keying Scheme with Key Recovery Property. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Chae Hoon Lim, Pil Joong Lee |
A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
26 | Barbara C. Davis, Tatu Ylönen |
Working Group Report on Internet/Intranet Security. |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
intranet security, key backup, security implementation costs, security functionality, fault tolerance, Internet, enterprises, secure communications, Internet security, data protection, information infrastructure, key recovery, key escrow, law enforcement, redundant paths, data value |
25 | Itsik Mantin |
A Practical Attack on the Fixed RC4 in the WEP Mode. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks |
25 | Simon Fischer 0002, Shahram Khazaei, Willi Meier |
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Chosen IV analysis, Stream ciphers, eSTREAM, Trivium, Grain |
24 | Shahram Khazaei, Willi Meier |
On Reconstruction of RC4 Keys from Internal States. |
MMICS |
2008 |
DBLP DOI BibTeX RDF |
Binary Hypothesis Testing, Stream Ciphers, RC4, Key Recovery |
24 | Craig Gentry, Jakob Jonsson, Jacques Stern, Michael Szydlo |
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
NSS, Transcript Analysis, Cyclotomic Integer, Cryptanalysis, Lattice, Signature Scheme, Key Recovery, NTRU, Forgery |
24 | Eric R. Verheul, Henk C. A. van Tilborg |
Binding ElGamal: A Fraud-Detectable Alternative to Key-Escrow Proposals. |
EUROCRYPT |
1997 |
DBLP DOI BibTeX RDF |
Traceable ElGamal, Key Recovery, Key Escrow, ElGamal |
24 | Sarbari Gupta |
A Common Key Recovery Block Format: Promoting Interoperability Between Dissimilar Key Recovery Mechanisms. |
Comput. Secur. |
2000 |
DBLP DOI BibTeX RDF |
|
23 | Lars R. Knudsen, Chris J. Mitchell |
Partial Key Recovery Attack Against RMAC. |
J. Cryptol. |
2005 |
DBLP DOI BibTeX RDF |
RMAC, AES, Message Authentication Codes, Triple DES |
23 | Tomoki Uemura, Yohei Watanabe 0001, Yang Li 0001, Noriyuki Miura, Mitsugu Iwamoto, Kazuo Sakiyama, Kazuo Ohta |
A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule. |
ISITA |
2020 |
DBLP BibTeX RDF |
|
23 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
Elastic block ciphers: method, security and instantiations. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Elastic block ciphers, Variable-length block ciphers, Reduction proof, Security analysis, Key recovery attacks |
23 | Xiaoyun Wang 0001, Hongbo Yu, Wei Wang 0035, Haina Zhang, Tao Zhan |
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
MDx-MAC, Distinguishing attack, MD5, Key recovery, HMAC, NMAC |
23 | María Naya-Plasencia |
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack |
22 | Takashi Matsunaka, Atsuko Miyaji, Yuuki Takano |
Success Probability in Chi2-Attacks. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
RC5-64, 2 attack, statistical analysis, RC6 |
21 | María Naya-Plasencia |
Cryptanalysis of Achterbahn-128/80. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack |
21 | Adrian Perrig, Dawn Xiaodong Song, J. D. Tygar |
ELK, A New Protocol for Efficient Large-Group Key Distribution. |
S&P |
2001 |
DBLP DOI BibTeX RDF |
|
21 | Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir |
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
|
21 | Hans Georg Schaathun |
A key-recovery attack on authentication watermarking by li and yuan. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
watermarking, image authentication, mac |
21 | Birgit Pfitzmann, Michael Waidner |
How to Break Fraud-Detectable Key Recovery. |
ACM SIGOPS Oper. Syst. Rev. |
1998 |
DBLP DOI BibTeX RDF |
|
20 | Eli Biham, Orr Dunkelman, Nathan Keller |
A Simple Related-Key Attack on the Full SHACAL-1. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Christophe Petit 0001, François-Xavier Standaert, Olivier Pereira, Tal Malkin, Moti Yung |
A block cipher based pseudo random number generator secure against side-channel key recovery. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Pierre-Alain Fouque, Gilles Macario-Rat, Jacques Stern |
Key Recovery on Hidden Monomial Multivariate Schemes. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Eric Ke Wang, Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Zoe Lin Jiang, Siu-Ming Yiu |
A Key-Recovery System for Long-term Encrypted Documents. |
EDOC Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Adam Stubblefield, John Ioannidis, Aviel D. Rubin |
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
wired equivalent privacy, Wireless security |
19 | Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell |
Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Message Authentication Codes, CBC-MAC |
19 | Paolo D'Arco, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants. |
MFCS |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Prasanna Ravi, Shivam Bhasin, Sujoy Sinha Roy, Anupam Chattopadhyay |
On Exploiting Message Leakage in (few) NIST PQC Candidates for Practical Message Recovery and Key Recovery Attacks. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
18 | François-Xavier Standaert, Tal Malkin, Moti Yung |
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Martin Hell, Thomas Johansson 0001 |
A Key Recovery Attack on Edon80. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Scott Contini, Yiqun Lisa Yin |
Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Chris J. Mitchell |
Partial Key Recovery Attacks on XCBC, TMAC and OMAC. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
|
17 | Caicai Chen, Chris Jones |
Key-Recovery Attack on a Public-Key Encryption Related to Planted Clique. |
IACR Cryptol. ePrint Arch. |
2024 |
DBLP BibTeX RDF |
|
17 | Puja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, Ingrid Verbauwhede |
A Practical Key-Recovery Attack on LWE-Based Key-Encapsulation Mechanism Schemes Using Rowhammer. |
ACNS (3) |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Puja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, Ingrid Verbauwhede |
A practical key-recovery attack on LWE-based key-encapsulation mechanism schemes using Rowhammer. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Puja Mondal, Suparna Kundu, Sarani Bhattacharya, Angshuman Karmakar, Ingrid Verbauwhede |
A practical key-recovery attack on LWE-based key- encapsulation mechanism schemes using Rowhammer. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
17 | Matthew Beighton, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong |
Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection. |
ACISP |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang 0001, Keting Jia, Yunwen Liu |
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule: Applications to Boomerangs in SKINNY and ForkSkinny. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
17 | Lingyue Qin, Xiaoyang Dong, Xiaoyun Wang 0001, Keting Jia, Yunwen Liu |
Automated Search Oriented to Key Recovery on Ciphers with Linear Key Schedule Applications to Boomerangs in SKINNY and ForkSkinny. |
IACR Trans. Symmetric Cryptol. |
2021 |
DBLP DOI BibTeX RDF |
|
17 | Takanori Isobe 0001, Kyoji Shibutani |
Key-Recovery Security of Single-Key Even-Mansour Ciphers. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2020 |
DBLP DOI BibTeX RDF |
|
17 | Rongjia Li, Chenhui Jin, Hongchen Pan |
Key recovery attacks on reduced-round Joltik-BC in the single-key setting. |
Inf. Process. Lett. |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Hua Wang, Yongli Zhao, Xiaosong Yu, Avishek Nag, Zhangchao Ma, Jianquan Wang, Longchuan Yan, Jie Zhang 0006 |
Resilient Quantum Key Distribution (QKD)-Integrated Optical Networks With Secret-Key Recovery Strategy. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Takanori Isobe 0001, Kyoji Shibutani |
Meet-in-the-Middle Key Recovery Attacks on a Single-Key Two-Round Even-Mansour Cipher. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2019 |
DBLP DOI BibTeX RDF |
|
17 | Meicheng Liu, Jingchun Yang, Wenhao Wang 0001, Dongdai Lin |
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
17 | Meicheng Liu, Jingchun Yang, Wenhao Wang 0001, Dongdai Lin |
Correlation Cube Attacks: From Weak-Key Distinguisher to Key Recovery. |
EUROCRYPT (2) |
2018 |
DBLP DOI BibTeX RDF |
|
17 | Yasufumi Hashimoto |
Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2017 |
DBLP DOI BibTeX RDF |
|
17 | Houzhen Wang, Huanguo Zhang, Shaohua Tang |
Key recovery on several matrix public-key encryption schemes. |
IET Inf. Secur. |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Mengting Chen, Yang Li 0022, Jian Wang 0038 |
Another SPA Key Recovery Against Random Order Countermeasures for AES Key Expansion. |
ICCCS (1) |
2016 |
DBLP DOI BibTeX RDF |
|
17 | Yu Sasaki, Gaoli Wang, Lei Wang 0031 |
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Pierre Karpman |
From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
17 | Ahmed Abdelkhalek 0001, Mohamed Tolba, Amr M. Youssef |
Improved Key Recovery Attack on Round-reduced Hierocrypt-L1 in the Single-Key Setting. |
SPACE |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Pierre Karpman |
From Distinguishers to Key Recovery: Improved Related-Key Attacks on Even-Mansour. |
ISC |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Tomoyuki Tanigaki, Noboru Kunihiro |
Maximum Likelihood-Based Key Recovery Algorithm from Decayed Key Schedules. |
ICISC |
2015 |
DBLP DOI BibTeX RDF |
|
17 | Nicolas T. Courtois, Pinar Emirdag, Filippo Valsorda |
Private Key Recovery Combination Attacks: On Extreme Fragility of Popular Bitcoin Key Management, Wallet and Cold Storage Solutions in Presence of Poor RNG Events. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
17 | Yu Sasaki, Lei Wang 0031 |
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5. |
Selected Areas in Cryptography |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean |
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting. |
EUROCRYPT |
2013 |
DBLP DOI BibTeX RDF |
|
17 | Jiageng Chen, Atsuko Miyaji |
Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean |
Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
17 | Chunfei Ju, Hui Yuan |
Key Recovery Attack on a Knapsack Public Key Cryptosystem. |
INCoS |
2012 |
DBLP DOI BibTeX RDF |
|
17 | Abdel Alim Kamal, Amr M. Youssef |
Applications of SAT Solvers to AES key Recovery from Decayed Key Schedule Images. |
IACR Cryptol. ePrint Arch. |
2010 |
DBLP BibTeX RDF |
|
17 | Abdel Alim Kamal, Amr M. Youssef |
Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule Images. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Jiageng Chen, Atsuko Miyaji |
A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model. |
Inscrypt |
2010 |
DBLP DOI BibTeX RDF |
|
17 | Taenam Cho, Sang-Ho Lee 0004, Won Kim 0001 |
A group key recovery mechanism based on logical key hierarchy. |
J. Comput. Secur. |
2004 |
DBLP DOI BibTeX RDF |
|
17 | Taenam Cho, Sang-Ho Lee |
A Key Recovery Mechanism for Reliable Group Key Management. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Sarbari Gupta, Stephen M. Matyas |
Public Key Infrastructure: Analysis of Existing and Needed Protocols and Object Formats for Key Recovery. |
Comput. Secur. |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Hal Abelson, Ross J. Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter G. Neumann, Ronald L. Rivest, Jeffrey I. Schiller, Bruce Schneier |
The risks of key recovery, key escrow, and trusted third-party encryption. |
World Wide Web J. |
1997 |
DBLP BibTeX RDF |
|
17 | Emilia Käsper, Vincent Rijmen, Tor E. Bjørstad, Christian Rechberger, Matthew J. B. Robshaw, Gautham Sekar |
Correlated Keystreams in Moustique. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
Moustique, related keys, eSTREAM |
17 | Yu Sasaki |
Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
DMMD, collision, HMAC, second preimage, AURORA |
16 | Phong Q. Nguyen, Oded Regev 0001 |
Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
GGH, NTRUSign, Lattices, Moment, Gradient descent, Public-key cryptanalysis |
Displaying result #1 - #100 of 574 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ >>] |
|