Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
95 | Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
IDEA and MESH ciphers, known-plaintext attack, Cryptanalysis |
90 | Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng |
An Efficient Known Plaintext Attack on FEA-M. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
89 | Michael Stay |
ZIP Attacks with Reduced Known Plaintext. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
89 | Anne Tardy-Corfdir, Henri Gilbert |
A Known Plaintext Attack of FEAL-4 and FEAL-6. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
80 | Paul C. van Oorschot, Michael J. Wiener |
A Known Plaintext Attack on Two-Key Triple Encryption. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
Triple encryption, cryptanalysis, DES |
69 | Ivan Damgård, Jesper Buus Nielsen |
Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
63 | Eun-Jun Yoon, Kee-Young Yoo |
An Improved Digital Signature with Message Recovery Using Self-certified Public Keys Without Trustworthy System Authority. |
SOFSEM |
2006 |
DBLP DOI BibTeX RDF |
Self-certified public key, Known plaintext-ciphertext attack, Cryptography, Digital signature, Message recovery |
62 | Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat |
Efficient Uses of FPGAs for Implementations of DES and Its Experimental Linear Cryptanalysis. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
FPGA, Cryptography, DES, linear cryptanalysis, efficient implementations |
62 | Dominik Engel, Rade Kutil, Andreas Uhl |
A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. |
MM&Sec |
2006 |
DBLP DOI BibTeX RDF |
ciphertext-only, known-plaintext, secret frequency domain, secret parameterized wavelet filters, attack, JPEG2000 |
62 | Tzonelih Hwang, T. R. N. Rao |
Secret Error-Correcting Codes (SECC). |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity |
54 | Joydip Mitra |
A Near-Practical Attack Against B Mode of HBB. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
known-plaintext attack, HBB, cryptanalysis, stream cipher |
53 | Jun Song 0003, Huanguo Zhang, Qingshu Meng, Zhang-yi Wang |
Cryptanalysis of Two-Round DES Using Genetic Algorithms. |
ISICA |
2007 |
DBLP DOI BibTeX RDF |
two-round DES, known plaintext attack, genetic algorithm, cryptanalysis, fitness function |
51 | Atsuko Miyaji, Masao Nonaka, Yoshinori Takii |
Known Plaintext Correlation Attack against RC5. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
|
50 | Kazuhiko Minematsu, Yukiyasu Tsunoo |
Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Jacques Patarin |
Security of Random Feistel Schemes with 5 or More Rounds. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Herbert S. Bright |
Cryptanalytic Attack and Defense: Ciphertext-Only, Known-Plaintext, Chosen-Plaintext. |
Cryptologia |
1977 |
DBLP DOI BibTeX RDF |
|
47 | Jacques Patarin |
Luby-Rackoff: 7 Rounds Are Enough for 2n(1-epsilon)Security. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
47 | Thomas Jakobson |
Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
interpolation attack, non-linear relations, Sudan's algorithm, Cryptanalysis, block cipher, Reed-Solomon codes |
44 | Mitsuru Matsui, Atsuhiro Yamagishi |
A New Method for Known Plaintext Attack of FEAL Cipher. |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
42 | Soichi Furuya |
Slide Attacks with a Known-Plaintext Cryptanalysis. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
40 | Toshinobu Kaneko |
A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference. |
ASIACRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
32 | Pascal Junod |
New Attacks Against Reduced-Round Versions of IDEA. |
FSE |
2005 |
DBLP DOI BibTeX RDF |
Demirci-Biryukov relation, Block ciphers, IDEA |
32 | Wenbo Mao, Colin Boyd |
On Strengthening Authentication Protocols to Foil Cryptanalysis. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
30 | Baudoin Collard, François-Xavier Standaert |
A Statistical Saturation Attack against the Block Cipher PRESENT. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Ivan Damgård, Thomas Pedersen, Louis Salvail |
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Adam L. Young, Moti Yung |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography |
30 | Johan Borst, Bart Preneel, Joos Vandewalle |
Linear Cryptanalysis of RC5 and RC6. |
FSE |
1999 |
DBLP DOI BibTeX RDF |
|
30 | Alex Biryukov, Eyal Kushilevitz |
From Differential Cryptanalysis to Ciphertext-Only Attacks. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Madryga, RC5, ciphertext-only attack, differential-linear attack, block-ciphers, DES, differential cryptanalysis |
30 | Daniel Espinoza Figueroa |
Compromising sensitive information through Padding Oracle and Known Plaintext attacks in Encrypt-then-TLS scenarios. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
30 | Subrata Nandi, Srinivasan Krishnaswamy, Behrouz Zolfaghari, Pinaki Mitra |
Key-Dependent Feedback Configuration Matrix of Primitive σ-LFSR and Resistance to Some Known Plaintext Attacks. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Fusen Wang, Jun Sang, Chunlin Huang, Bin Cai, Hong Xiang, Nong Sang |
Applying Deep Learning to Known-Plaintext Attack on Chaotic Image Encryption Schemes. |
ICASSP |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Nino Fürthauer, Vasily Mikhalev, Nils Kopal, Bernhard Esslinger, Harald Lampesberger, Eckehard Hermann |
Evaluating Deep Learning Techniques for Known-Plaintext Attacks on the Complete Columnar Transposition Cipher. |
HistoCrypt |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Seongbong Choi, Hyung Tae Lee |
Known Plaintext Attacks on the Omar and abed Homomorphic Encryption Scheme. |
ICTC |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Sherif Abdelfattah, Mohamed Baza, Mahmoud M. Badr, Mohamed M. E. A. Mahmoud, Gautam Srivastava 0001, Fawaz Alsolami 0001, Abdullah Marish Ali |
Efficient Search Over Encrypted Medical Data With Known-Plaintext/Background Models and Unlinkability. |
IEEE Access |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Takehisa Iwakoshi |
Security Evaluation of Y00 Protocol Based on Time-Translational Symmetry Under Quantum Collective Known-Plaintext Attacks. |
IEEE Access |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Fusen Wang, Jun Sang, Qi Liu, Chunlin Huang, Jinghan Tan |
A deep learning based known plaintext attack method for chaotic cryptosystem. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
30 | Yanjun Pan, Yao Zheng, Ming Li 0003 |
ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
30 | Yanjun Pan, Yao Zheng, Ming Li 0003 |
ROBin: Known-Plaintext Attack Resistant Orthogonal Blinding via Channel Randomization. |
INFOCOM |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Shuming Jiao, Ting Lei, Yang Gao, Zhenwei Xie, Xiaocong Yuan |
Known-Plaintext Attack and Ciphertext-Only Attack for Encrypted Single-Pixel Imaging. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Shuming Jiao, Yang Gao, Ting Lei, Zhenwei Xie, Xiaocong Yuan |
Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
30 | Leo Yu Zhang, Yuansheng Liu, Cong Wang 0001, Jiantao Zhou 0001, Yushu Zhang, Guanrong Chen |
Improved known-plaintext attack to permutation-only multimedia ciphers. |
Inf. Sci. |
2018 |
DBLP DOI BibTeX RDF |
|
30 | Junjun Gan, Jiu-fen Liu, Xiangyang Luo, Chunfang Yang, Fenlin Liu |
Reliable steganalysis of HUGO steganography based on partially known plaintext. |
Multim. Tools Appl. |
2018 |
DBLP DOI BibTeX RDF |
|
30 | Takehisa Iwakoshi |
Guessing probability under unlimited known-plaintext attack on secret keys for Y00 quantum stream cipher by quantum multiple hypotheses testing. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
30 | Mauro Mangia, Fabio Pareschi, Riccardo Rovatti, Gianluca Setti |
Low-Cost Security of IoT Sensor Nodes With Rakeness-Based Compressed Sensing: Statistical and Known-Plaintext Attacks. |
IEEE Trans. Inf. Forensics Secur. |
2018 |
DBLP DOI BibTeX RDF |
|
30 | George Lasry, Nils Kopal, Arno Wacker |
Automated Known-Plaintext Cryptanalysis of Short Hagelin M-209 Messages. |
Cryptologia |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Matthias Schulz 0001, Adrian Loch, Matthias Hollick |
DEMO: Demonstrating Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems. |
WISEC |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Yao Zheng, Matthias Schulz 0001, Wenjing Lou, Yiwei Thomas Hou, Matthias Hollick |
Highly Efficient Known-Plaintext Attacks Against Orthogonal Blinding Based Physical Layer Security. |
IEEE Wirel. Commun. Lett. |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Valerio Cambareri, Mauro Mangia, Fabio Pareschi, Riccardo Rovatti, Gianluca Setti |
On Known-Plaintext Attacks to a Compressed Sensing-Based Encryption: A Quantitative Analysis. |
IEEE Trans. Inf. Forensics Secur. |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Ye Yuan, Yilin Mo |
Security in cyber-physical systems: Controller design against Known-Plaintext Attack. |
CDC |
2015 |
DBLP DOI BibTeX RDF |
|
30 | Chunsheng Gu, Jixing Gu |
Known-plaintext attack on secure kNN computation on encrypted databases. |
Secur. Commun. Networks |
2014 |
DBLP DOI BibTeX RDF |
|
30 | Matthias Schulz 0001, Adrian Loch, Matthias Hollick |
Practical Known-Plaintext Attacks against Physical Layer Security in Wireless MIMO Systems. |
NDSS |
2014 |
DBLP BibTeX RDF |
|
30 | Valerio Cambareri, Mauro Mangia, Fabio Pareschi, Riccardo Rovatti, Gianluca Setti |
Low-complexity Multiclass Encryption by Compressed Sensing, Part II: Known-Plaintext Attacks. |
CoRR |
2013 |
DBLP BibTeX RDF |
|
30 | Adi Shamir, Eldad Zinger |
A Practical Polynomial-Time Known-Plaintext Attack on a Cryptosystem Proposed by John Nash. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
30 | Alex Biryukov |
Known Plaintext Attack. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Rajaraman Vaidyanathaswami, Andrew Thangaraj |
Known plaintext attack on the binary symmetric wiretap channel. |
GLOBECOM Workshops |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Wafaa G. Abd-Elmonim, Neveen I. Ghali, Aboul Ella Hassanien, Ajith Abraham |
Known-plaintext attack of DES-16 using Particle Swarm Optimization. |
NaBIC |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Kyung Chul Jeong, Dong Hoon Lee 0002, Daewan Han |
An Improved Known Plaintext Attack on PKZIP Encryption Algorithm. |
ICISC |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Ee-Chien Chang, Chengfang Fang, Jia Xu 0006 |
A chameleon encryption scheme resistant to known-plaintext attack. |
Digital Rights Management Workshop |
2010 |
DBLP DOI BibTeX RDF |
|
30 | Martin Hlavác |
Known-Plaintext-Only Attack on RSA-CRT with Montgomery Multiplication. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
Montgomery exponentiation, electronic passport, RSA, side channel attack, Chinese Remainder Theorem, Hidden Number Problem |
30 | Gonzalo Álvarez Marañón, Luis Hernández Encinas, Jaime Muñoz Masqué |
Known-Plaintext Attack to Two Cryptosystems Based on the BB Equation. |
IEEE Trans. Circuits Syst. II Express Briefs |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Ueli M. Maurer, Johan Sjödin |
A Fast and Key-Efficient Reduction of Chosen-Ciphertext to Known-Plaintext Security. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Jung Hee Cheon, Woo-Hwan Kim, Hyun Soo Nam |
Known-plaintext cryptanalysis of the Domingo-Ferrer algebraic privacy homomorphism scheme. |
Inf. Process. Lett. |
2006 |
DBLP DOI BibTeX RDF |
|
30 | Ueli Maurer, Johan Sjödin |
A Fast and Key-Efficient Reduction of Chosen- Ciphertext to Known-Plaintext Security. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
30 | H. D. Phaneendra, C. Vidya Raj, M. S. Shivakumar |
Applying Quantum Search to a Known-Plaintext Attack on Two-Key Triple Encryption. |
Intelligent Information Processing |
2006 |
DBLP DOI BibTeX RDF |
Quantum algorithm, exhaustive search, Quantum mechanics, qubits, Quantum search, 3DES |
30 | Alex Biryukov |
Known plaintext attack. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Sahadeo Padhye |
Partial known plaintext attack on Koyama scheme. |
Inf. Process. Lett. |
2005 |
DBLP DOI BibTeX RDF |
|
30 | Adam J. Slagell |
Known-Plaintext Attack Against a Permutation Based Video. |
IACR Cryptol. ePrint Arch. |
2004 |
DBLP BibTeX RDF |
|
30 | Marina Pudovkina |
A known plaintext attack on the ISAAC keystream generator. |
IACR Cryptol. ePrint Arch. |
2001 |
DBLP BibTeX RDF |
|
30 | H. Paul Greenough |
Cryptanalysis of the Hagelin C-52 and Similar Machines a Known Plaintext Attack. |
Cryptologia |
1999 |
DBLP DOI BibTeX RDF |
|
30 | H. Paul Greenough |
Cryptanalysis of the Swedish HC-9 a Known-Plaintext Approach. |
Cryptologia |
1997 |
DBLP DOI BibTeX RDF |
|
30 | Eli Biham, Paul C. Kocher |
A Known Plaintext Attack on the PKZIP Stream Cipher. |
FSE |
1994 |
DBLP DOI BibTeX RDF |
|
30 | Jack Levine, Richard Chandler |
The Hill Cryptographic System with Unknown Cipher Alphabet but Known Plaintext. |
Cryptologia |
1989 |
DBLP DOI BibTeX RDF |
|
30 | Frank Rubin |
Foiling the Known-Plaintext Attack. |
Cryptologia |
1986 |
DBLP DOI BibTeX RDF |
|
29 | Joana Treger, Jacques Patarin |
Generic Attacks on Feistel Networks with Internal Permutations. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
29 | Jacques Patarin, Valérie Nachef, Côme Berbain |
Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
unbalanced Feistel permutations, generic attacks, Luby-Rackoff theory, block ciphers, pseudo-random permutations |
29 | Chae Hoon Lim, Pil Joong Lee |
Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
22 | Orhun Kara |
Reflection Cryptanalysis of Some Ciphers. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Round Function, Round Key, Cryptanalysis, Block Cipher, Self-similarity, Related Key Attack, Slide Attack, Key Schedule, Reflection attack |
22 | Chris J. Mitchell |
Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Alex Biryukov, David A. Wagner 0001 |
Advanced Slide Attacks. |
EUROCRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Daniel Socek, Dubravko Culibrk |
On the security of a clipped hopfield neural network-based cryptosystem. |
MM&Sec |
2005 |
DBLP DOI BibTeX RDF |
neural networks, cryptography, randomness, permutations, data security |
21 | Jaemin Choi, Jongsung Kim, Jaechul Sung, Sangjin Lee 0002, Jongin Lim 0001 |
Related-Key and Meet-in-the-Middle Attacks on Triple-DES and DES-EXE. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
21 | Lars R. Knudsen, Willi Meier, Bart Preneel, Vincent Rijmen, Sven Verdoolaege |
Analysis Methods for (Alleged) RC4. |
ASIACRYPT |
1998 |
DBLP DOI BibTeX RDF |
|
21 | Willi Meier, Othmar Staffelbach |
Analysis of Pseudo Random Sequence Generated by Cellular Automata. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
21 | Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman |
Is the Data Encryption Standard a Group? (Preliminary Abstract). |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptanalysis, Data Encryption Standard (DES), multiple encryption, Birthday Paradox |
20 | Flavio D. Garcia, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur |
Wirelessly Pickpocketing a Mifare Classic Card. |
SP |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Farhad Maleki, Ali Mohades, S. Mehdi Hashemi, Mohammad E. Shiri |
An Image Encryption System by Cellular Automata with Memory. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
image security, Lossy method, Cryptography, Cellular automata, image encryption, CA |
20 | Andrey Bogdanov |
Improved Side-Channel Collision Attacks on AES. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
generalized collisions, AES, side-channel attacks, random graphs, connected components, collision attacks |
20 | Jacques Patarin, Valérie Nachef, Côme Berbain |
Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
Unbalanced Feistel permutations, generic attacks on encryption schemes, Block ciphers, pseudo-random permutations |
20 | Jiantao Zhou 0001, Zhiqin Liang, Yan Chen 0007, Oscar C. Au |
On the Security of Multimedia Encryption Schemes Based on Multiple Huffman Table (MHT). |
ICME |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Kazuhiko Minematsu, Yukiyasu Tsunoo |
Expanding Weak PRF with Small Key Size. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
|
20 | S. S. Bedi, N. Rajesh Pillai |
Cryptanalysis of the Nonlinear FeedForward Generator. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Eli Biham, Adi Shamir |
Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
20 | Shoji Miyaguchi |
The FEAL-8 Cryptosystem and a Call for Attack. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
16 | Martin Hell, Thomas Johansson 0001 |
Two New Attacks on the Self-Shrinking Generator. |
IEEE Trans. Inf. Theory |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Chris J. Mitchell |
Cryptanalysis of the EPBC Authenticated Encryption Mode. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Mitsuru Matsui |
Linear Cryptanalysis Method for DES Cipher. |
EUROCRYPT |
1993 |
DBLP DOI BibTeX RDF |
|
13 | Willi Meier, Othmar Staffelbach |
Correlation Properties of Combiners with Memory in Stream Ciphers. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
12 | Takeyuki Uehara, Reihaneh Safavi-Naini, Philip Ogunbona |
Recovering DC Coefficients in Block-Based DCT. |
IEEE Trans. Image Process. |
2006 |
DBLP DOI BibTeX RDF |
|
12 | Jorge Nakahara Jr., Daniel Santana de Freitas |
Cryptanalysis of Ake98. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
Akelarre, Ake98, RC5, cryptanalysis, AES, IDEA, RC6 |
12 | Souradyuti Paul, Bart Preneel |
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|