|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 74 occurrences of 50 keywords
|
|
|
Results
Found 86 publication records. Showing 86 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
85 | Elad Barkan, Eli Biham, Nathan Keller |
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. |
J. Cryptol. |
2008 |
DBLP DOI BibTeX RDF |
Ciphertext-only, SIM, A5/2, A5/1, Cryptanalysis, SMS, GSM, GPRS, Cellular |
76 | Anne Canteaut, Eric Filiol |
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
ciphertext only reconstruction, Boolean function, stream cipher, correlation, linear feedback shift register |
76 | Alex Biryukov, Eyal Kushilevitz |
From Differential Cryptanalysis to Ciphertext-Only Attacks. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Madryga, RC5, ciphertext-only attack, differential-linear attack, block-ciphers, DES, differential cryptanalysis |
65 | Yukiyasu Tsunoo, Eiji Okamoto, Tomohiko Uyematsu |
Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext. |
CRYPTO |
1994 |
DBLP DOI BibTeX RDF |
|
53 | Nicolas T. Courtois |
Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
overdefined systems of multivariate equations, MQ problem, Gröbner bases, ciphertext-only attacks, Toyocrypt-HR1, Toyocrypt-HS1, Cryptrec, stream ciphers, nonlinear filtering, pseudo-random generators, Multivariate cryptography, XL algorithm |
51 | Elad Barkan, Eli Biham, Nathan Keller |
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
|
45 | Nicolas T. Courtois, Willi Meier |
Algebraic Attacks on Stream Ciphers with Linear Feedback. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Algebraic attacks on stream ciphers, factoring multivariate polynomials, overdefined problems, ciphertext-only attacks, Toyocrypt, Cryptrec, LILI-128, Boolean functions, nonlinear filtering, pseudo-random generators, Nessie, XL algorithm, multivariate equations |
44 | Tzonelih Hwang, T. R. N. Rao |
Secret Error-Correcting Codes (SECC). |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity |
43 | Dominik Engel, Rade Kutil, Andreas Uhl |
A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. |
MM&Sec |
2006 |
DBLP DOI BibTeX RDF |
ciphertext-only, known-plaintext, secret frequency domain, secret parameterized wavelet filters, attack, JPEG2000 |
38 | Yunyu Li, Jiantao Zhou 0001, Yuanman Li |
Ciphertext-Only Attack on an Image Homomorphic Encryption Scheme with Small Ciphertext Expansion. |
ACM Multimedia |
2015 |
DBLP DOI BibTeX RDF |
|
36 | Yuji Watanabe, Masayuki Numao |
Conditional Cryptographic Delegation for P2P Data Sharing. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
|
36 | Yair Frankel, Moti Yung |
Cryptanalysis of the Immunized LL Public Key Systems. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
35 | Norman Proctor |
A Self-Synchronizing Cascaded Cipher System With Dynamic Control of Error-Propagation. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
32 | Slobodan Petrovic, Amparo Fúster-Sabater |
Clock Control Sequence Reconstruction in the Ciphertext Only Attack Scenario. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
Irregular clocking, Cryptanalysis, Edit distance, Correlation attack, Directed search |
27 | Andrey Bogdanov, Thomas Eisenbarth 0001, Andy Rupp |
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
A5/2, SMITH, cryptanalysis, GSM, Gaussian elimination, special-purpose hardware, linear systems of equations |
27 | Mithun Acharya, Joao Girão, Dirk Westhoff |
Secure Comparison of Encrypted Data in Wireless Sensor Networks. |
WiOpt |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Shyam Murthy, Santosh Kumar Upadhyaya, Srinivas Vivek 0001 |
Ciphertext-Only Attack on a Secure k-NN Computation on Cloud. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
23 | Dongjae Lee, Jaewoo Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong |
A Practical Ciphertext-Only Attack on GMR-2 System. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Dongjae Lee, Deukjo Hong, Jaechul Sung, Seonggyeom Kim, Seokhie Hong |
Improved Ciphertext-Only Attack on GMR-1. |
IEEE Access |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Haoyu Li, Renzhang Liu, Zhen Liu, Yanbin Pan, Tianyuan Xie |
Ciphertext-Only Attacks Against Compact-LWE Submitted to NIST PQC Project. |
J. Syst. Sci. Complex. |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Wei Li 0013, Shan Cao, Dawu Gu, Jiayao Li, Tianpei Cai, Menglin Wang, Li Sun, Zhiqiang Liu 0001, Ya Liu 0001 |
Ciphertext-only fault analysis of GIFT lightweight cryptosystem. |
Sci. China Inf. Sci. |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Tatsuya Chuman, Hitoshi Kiya |
Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification against Ciphertext-only Attacks. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Tatsuya Chuman, Hitoshi Kiya |
Security Evaluation of Compressible Image Encryption for Privacy-Preserving Image Classification Against Ciphertext-Only Attacks. |
ICMLC |
2022 |
DBLP DOI BibTeX RDF |
|
23 | Anas Ibrahim, Alexander G. Chefranov, Rushdi Hamamreh |
Ciphertext-only attack on RSA using lattice basis reduction. |
Int. Arab J. Inf. Technol. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Thomas Kaeding |
Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers. |
Cryptologia |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Wei Li 0013, Linfeng Liao, Dawu Gu, Shan Cao, Yixin Wu, Jiayao Li, Zhihong Zhou, Zheng Guo 0001, Ya Liu 0001, Zhiqiang Liu 0001 |
Ciphertext-only fault analysis on the Midori lightweight cryptosystem. |
Sci. China Inf. Sci. |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Warit Sirichotedumrong, Hitoshi Kiya |
Visual Security Evaluation of Learnable Image Encryption Methods against Ciphertext-only Attacks. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
23 | Thomas Kaeding |
Slippery hill-climbing technique for ciphertext-only cryptanalysis of periodic polyalphabetic substitution ciphers. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
23 | Thomas Kaeding |
Automated ciphertext-only attack on the Wheatstone Cryptograph and related devices. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
23 | Warit Sirichotedumrong, Hitoshi Kiya |
Visual Security Evaluation of Learnable Image Encryption Methods against Ciphertext-only Attacks. |
APSIPA |
2020 |
DBLP BibTeX RDF |
|
23 | Shuming Jiao, Ting Lei, Yang Gao, Zhenwei Xie, Xiaocong Yuan |
Known-Plaintext Attack and Ciphertext-Only Attack for Encrypted Single-Pixel Imaging. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Shuming Jiao, Yang Gao, Ting Lei, Zhenwei Xie, Xiaocong Yuan |
Known-plaintext attack and ciphertext-only attack for encrypted single-pixel imaging. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
23 | Wei Li 0013, Linfeng Liao, Dawu Gu, Chaoyun Li, Chenyu Ge, Zheng Guo 0001, Ya Liu 0001, Zhiqiang Liu 0001 |
Ciphertext-Only Fault Analysis on the LED Lightweight Cryptosystem in the Internet of Things. |
IEEE Trans. Dependable Secur. Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Nicolas T. Courtois, Maria-Bristena Oprisanu |
Ciphertext-only attacks and weak long-term keys in T-310. |
Cryptologia |
2018 |
DBLP DOI BibTeX RDF |
|
23 | George Lasry, Nils Kopal, Arno Wacker |
Ciphertext-only cryptanalysis of short Hagelin M-209 ciphertexts. |
Cryptologia |
2018 |
DBLP DOI BibTeX RDF |
|
23 | Shahram Khazaei, Siavash Ahmadi |
Ciphertext-only attack on d × d Hill in O(d13d). |
Inf. Process. Lett. |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Yongwoo Lee 0002, Young-Sik Kim, Jong-Seon No |
Ciphertext-Only Attack on Linear Feedback Shift Register-Based Esmaeili-Gulliver Cryptosystem. |
IEEE Commun. Lett. |
2017 |
DBLP DOI BibTeX RDF |
|
23 | George Lasry, Nils Kopal, Arno Wacker |
Ciphertext-only cryptanalysis of Hagelin M-209 pins and lugs. |
Cryptologia |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Shahram Khazaei, Siavash Ahmadi |
Ciphertext-only attack on d*d Hill in O(d13d). |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
23 | Carlo Meijer, Roel Verdult |
Ciphertext-only Cryptanalysis on Hardened Mifare Classic Cards. |
CCS |
2015 |
DBLP DOI BibTeX RDF |
|
23 | Fabrizio De Santis, Oscar M. Guillen, Ermin Sakic, Georg Sigl |
Ciphertext-Only Fault Attacks on PRESENT. |
LightSec |
2014 |
DBLP DOI BibTeX RDF |
|
23 | Michal Mikus, Marek Sýs |
Ciphertext-Only Attack on Gentry-Halevi Implementation of Somewhat Homomorphic Scheme. |
MEMICS |
2012 |
DBLP DOI BibTeX RDF |
|
23 | Alex Biryukov |
Ciphertext-Only Attack. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Yanbin Pan, Yingpu Deng |
A Ciphertext-Only Attack Against the Cai-Cusick Lattice-Based Public-Key Cryptosystem. |
IEEE Trans. Inf. Theory |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Raj S. Katti, Sudarshan K. Srinivasan, Aida Vosoughi |
On the Security of Randomized Arithmetic Codes Against Ciphertext-Only Attacks. |
IEEE Trans. Inf. Forensics Secur. |
2011 |
DBLP DOI BibTeX RDF |
|
23 | Rainer Steinwandt |
A ciphertext-only attack on Polly Two. |
Appl. Algebra Eng. Commun. Comput. |
2010 |
DBLP DOI BibTeX RDF |
|
23 | António Machiavelo, Rogério Reis |
Automated Ciphertext - Only Cryptanalysis of the Bifid Cipher. |
Cryptologia |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Liaqat Ali Khan, Muhammad Shamim Baig, M. Ashraf Ashraf |
Exploiting Silence for Ciphertext Only Cryptanalysis of Stream Ciphered Digitized Voice. |
Security and Management |
2007 |
DBLP BibTeX RDF |
|
23 | Alex Biryukov |
Ciphertext-Only Attack. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Lars R. Knudsen, Vincent Rijmen |
Ciphertext-only Attack on Akelarre. |
Cryptologia |
2000 |
DBLP DOI BibTeX RDF |
|
23 | Heidi Williams |
Applying Statistical Language Recognition Techniques in the Ciphertext-only Cryptanalysis of Enigma. |
Cryptologia |
2000 |
DBLP DOI BibTeX RDF |
|
23 | James J. Gillogly |
Ciphertext-only Cryptanalysis of Enigma. |
Cryptologia |
1995 |
DBLP DOI BibTeX RDF |
|
23 | Thomas Siegenthaler |
Decrypting a Class of Stream Ciphers Using Ciphertext Only. |
IEEE Trans. Computers |
1985 |
DBLP DOI BibTeX RDF |
pseudonoise generator, exhaustive trials, cryptanalysis, Correlation |
23 | Donald V. Miller |
Ciphertext only Attack on the Merkle-Hellman Public-Key System under Broadcast Situations. |
Cryptologia |
1982 |
DBLP DOI BibTeX RDF |
|
23 | Herbert S. Bright |
Cryptanalytic Attack and Defense: Ciphertext-Only, Known-Plaintext, Chosen-Plaintext. |
Cryptologia |
1977 |
DBLP DOI BibTeX RDF |
|
20 | Ernest F. Brickell, Yacov Yacobi |
On Privacy Homomorphisms (Extended Abstract). |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
19 | Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen |
Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion. |
IEEE Trans. Circuits Syst. Video Technol. |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Daniel Socek, Dubravko Culibrk |
On the security of a clipped hopfield neural network-based cryptosystem. |
MM&Sec |
2005 |
DBLP DOI BibTeX RDF |
neural networks, cryptography, randomness, permutations, data security |
19 | Chris J. Mitchell |
Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Toshiki Habutsu, Yoshifumi Nishio, Iwao Sasase, Shinsaku Mori |
A Secret Key Cryptosystem by Iterating a Chaotic Map. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
18 | Elad Barkan, Eli Biham |
Conditional Estimators: An Effective Attack on A5/1. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Luke McAven, Reihaneh Safavi-Naini, Moti Yung |
Unconditionally Secure Encryption Under Strong Attacks. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
|
18 | Yacov Yacobi |
A Key Distribution "Paradox". |
CRYPTO |
1990 |
DBLP DOI BibTeX RDF |
|
11 | Jean Paul Degabriele, Kenneth G. Paterson |
Attacking the IPsec Standards in Encryption-only Configurations. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
10 | Jorge Nakahara Jr., Daniel Santana de Freitas |
Cryptanalysis of Ake98. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
Akelarre, Ake98, RC5, cryptanalysis, AES, IDEA, RC6 |
10 | Scott R. Fluhrer, Itsik Mantin, Adi Shamir |
Weaknesses in the Key Scheduling Algorithm of RC4. |
Selected Areas in Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
10 | David A. Wagner 0001, Leonie Simpson, Ed Dawson, John Kelsey, William Millan, Bruce Schneier |
Cryptanalysis of ORYX. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
10 | Miodrag J. Mihaljevic |
Security Examination of a Cellular Automata Based Pseudorandom Bit Generator Using an Algebraic Replica Approach. |
AAECC |
1997 |
DBLP DOI BibTeX RDF |
|
9 | Meiqin Wang, Jorge Nakahara Jr., Yue Sun |
Cryptanalysis of the Full MMB Block Cipher. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
MMB block cipher, square cryptanalysis, differential cryptanalysis, modular multiplication, linear cryptanalysis |
9 | Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang |
Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
linear hulls, algebraic analysis, systems of sparse polynomial equations of low degree, RFID, block ciphers |
9 | Shujun Li, Guanrong Chen, Albert Cheung, Kwok-Tung Lo, Mohan S. Kankanhalli |
On the Security of an MPEG-Video Encryption Scheme Based on Secret Huffman Tables. |
PSIVT |
2009 |
DBLP DOI BibTeX RDF |
|
9 | Xiaolan Joy Zhang, Brian King |
An Anti-Counterfeiting RFID Privacy Protection Protocol. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
privacy, integrity, RFID security |
9 | Ayoub Massoudi, Frédéric Lefèbvre, Marc Joye |
Cryptanalysis of a Video Scrambling Based on Space Filling Curves. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
9 | Jorge Nakahara Jr. |
A Linear Analysis of Blowfish and Khufu. |
ISPEC |
2007 |
DBLP DOI BibTeX RDF |
Blowfish, Khufu, key-dependent S- boxes, linear cryptanalysis |
9 | Bin Zhang 0003, Dengguo Feng |
Security analysis of a new stream cipher. |
Sci. China Ser. F Inf. Sci. |
2006 |
DBLP DOI BibTeX RDF |
divide-and-conquer attack, non-linear feedback shift registers (NLFSR), stream cipher, chaotic sequence |
9 | Einar Mykletun, Gene Tsudik |
Aggregation Queries in the Database-As-a-Service Model. (PDF / PS) |
DBSec |
2006 |
DBLP DOI BibTeX RDF |
|
9 | Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Hong Wang |
Weaknesses of COSvd (2, 128) Stream Cipher. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
COS cipher, Non- linear feedback shift register, Stream cipher, Divide-and-Conquer |
9 | Dahua Xie, C.-C. Jay Kuo |
Multimedia data encryption via random rotation in partitioned bit streams. |
ISCAS (6) |
2005 |
DBLP DOI BibTeX RDF |
|
9 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Security Weaknesses of Certain Broadcast Encryption Schemes. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
time-memory-data trade-off, cryptanalysis, key management, broadcast encryption |
9 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys. |
DRMTICS |
2005 |
DBLP DOI BibTeX RDF |
time-limited services, cryptographic keys management, time-bound keys, one-way mappings, broadcast encryption, pseudorandom number generators |
9 | Rainer Steinwandt |
Loopholes in Two Public Key Cryptosystems Using the Modular Group. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
9 | Itsik Mantin, Adi Shamir |
A Practical Attack on Broadcast RC4. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
9 | Muxiang Zhang, Christopher Carroll, Agnes Hui Chan |
Analysis of IS-95 CDMA Voice Privacy. |
Selected Areas in Cryptography |
2000 |
DBLP DOI BibTeX RDF |
|
9 | Eric Filiol |
Decimation Attack of Stream Ciphers. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
sequence decimation, multiple clocking, Stream cipher, linear feedback shift register, correlation attack, fast correlation attack |
9 | Sheelagh Lloyd |
Properties of Binary Functions. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
9 | Thomas Siegenthaler |
Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences. |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #86 of 86 (100 per page; Change: )
|
|