|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1525 occurrences of 465 keywords
|
|
|
Results
Found 2657 publication records. Showing 2657 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
118 | James L. Massey, Ueli M. Maurer, Muzhong Wang |
Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers. |
EUROCRYPT |
1987 |
DBLP DOI BibTeX RDF |
|
117 | Nicolas T. Courtois |
The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
interpolation attack on block ciphers, fractional transformations, homographic functions, generalised linear cryptanalysis, bi-linear cryptanalysis, Block ciphers, AES, Rijndael, Feistel ciphers, multivariate equations |
114 | Adam L. Young, Moti Yung |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography |
86 | Lars R. Knudsen, John Erik Mathiassen |
On the Role of Key Schedules in Attacks on Iterated Ciphers. |
ESORICS |
2004 |
DBLP DOI BibTeX RDF |
|
79 | Jovan Dj. Golic |
Modes of Operation of Stream Ciphers. |
Selected Areas in Cryptography |
2000 |
DBLP DOI BibTeX RDF |
keyed hash functions, security, Stream ciphers, block ciphers, hash functions, conversions |
78 | Souradyuti Paul, Bart Preneel |
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck |
CryptoGraphics: Secret Key Cryptography Using Graphics Cards. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
Graphics Processing Unit, Stream Ciphers, Block Ciphers, AES |
74 | Nicolas T. Courtois |
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. |
CRYPTO |
2003 |
DBLP DOI BibTeX RDF |
combiners with memory, LFSR synthesis, Toyocrypt, Cryptrec, LILI-128, E0, Boolean functions, stream ciphers, Bluetooth, nonlinear filters, Algebraic attacks, Berlekamp-Massey algorithm, Nessie, multivariate equations |
74 | Pawel Chodowiec, Po Khuon, Kris Gaj |
Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining. |
FPGA |
2001 |
DBLP DOI BibTeX RDF |
fast architectures, secret-key ciphers, pipelining, AES |
71 | Moses D. Liskov, Ronald L. Rivest, David A. Wagner 0001 |
Tweakable Block Ciphers. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
tweakable block ciphers, initialization vector, block ciphers, modes of operation |
69 | Gautham Sekar, Souradyuti Paul, Bart Preneel |
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
|
69 | Nicolas Sklavos 0001, Nick A. Moldovyan, Odysseas G. Koufopavlou |
High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers. |
Mob. Networks Appl. |
2005 |
DBLP DOI BibTeX RDF |
Cobra-H64, Cobra-H128, networking security, encryption, data-dependent permutations |
69 | Thomas Johansson 0001 |
Analysis and Design of Modern Stream Ciphers: (Invited Paper) p. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
67 | Nicolas T. Courtois |
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. |
AES Conference |
2004 |
DBLP DOI BibTeX RDF |
polynomial relations, design of cryptographic primitives, generalised linear cryptanalysis, multivariate public key encryption and signature schemes, Quartz, combiners with memory, elimination methods, Gröbner bases, Boolean functions, stream ciphers, block ciphers, AES, finite fields, algebraic attacks, Rijndael, Serpent, HFE, Sflash, multivariate equations |
66 | Don Coppersmith, Shai Halevi, Charanjit S. Jutla |
Cryptanalysis of Stream Ciphers with Linear Masking. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
Linear masking, Low-Diffusion attacks, Stream ciphers, Hypothesis testing, Linear cryptanalysis |
66 | Alex Biryukov, Adi Shamir |
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
time/memory tradeoff attacks, Cryptanalysis, stream ciphers |
66 | Rüdiger Weis, Stefan Lucks |
Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers. |
ECMAST |
1999 |
DBLP DOI BibTeX RDF |
Luby-Rackoff ciphers, BEAR, LION, BEAST, JAVA, Performance, block cipher |
63 | William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan |
Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
cascaded ciphers, Shannon model, Double DES, information theory, DES, Ciphers, meet in the middle attacks |
61 | Keke Wu, Huiyun Li, Bo Peng, Fengqi Yu |
Correlation Power Analysis Attack against Synchronous Stream Ciphers. |
ICYCS |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Mridul Nandi |
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
online cipher, CBC, universal hash function, random permutation |
61 | James G. Dunham, Ming-Tan Sun, J. C. R. Tseng |
Classifying file type of stream ciphers in depth using neural networks. |
AICCSA |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Thomas Jakobsen, Lars R. Knudsen |
The Interpolation Attack on Block Ciphers. |
FSE |
1997 |
DBLP DOI BibTeX RDF |
|
58 | Shakil Ahmad, Muhammad Arif Wahla, Firdous Kausar |
Authenticated Encryption in WSN Using eSTREAM Ciphers. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Security, Wireless Sensor Networks, Stream Ciphers, Authenticated Encryption |
58 | Nicolas T. Courtois, Josef Pieprzyk |
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
MQ problem, overdefined systems of multivariate equations, Gröbner bases, sparse multivariate polynomials, Multivariate Cryptanalysis, Block ciphers, AES, Rijndael, Square, Camellia, Serpent, XL algorithm, multivariate quadratic equations |
55 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
Elastic block ciphers: method, security and instantiations. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Elastic block ciphers, Variable-length block ciphers, Reduction proof, Security analysis, Key recovery attacks |
54 | Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002, Dukjae Moon |
Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. |
IMACC |
2005 |
DBLP DOI BibTeX RDF |
Cobra-H64, Cobra-H128, Block Ciphers, Related-Key Attacks, Data-Dependent Permutations |
53 | Lan Luo, Zhiguang Qin, Shijie Zhou |
A Comment to the Intelligent Functions of Different Weight Ciphers. |
WKDD |
2009 |
DBLP DOI BibTeX RDF |
|
53 | Christophe De Cannière, Orr Dunkelman, Miroslav Knezevic |
KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
|
53 | Johann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann 0007, Marcel Medwed |
Energy evaluation of software implementations of block ciphers under memory constraints. |
DATE |
2007 |
DBLP DOI BibTeX RDF |
energy optimization, code size reduction, symmetric cipher, lightweight cryptography, memory footprint |
53 | Gautham Sekar, Souradyuti Paul, Bart Preneel |
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten |
Differential Power Analysis of Stream Ciphers. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain |
53 | Shoichi Hirose |
Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
53 | Xuejia Lai, James L. Massey, Sean Murphy |
Markov Ciphers and Differential Cryptanalysis. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
52 | Debra L. Cook, Angelos D. Keromytis, Moti Yung |
Elastic block ciphers: the basic design. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
elastic block ciphers, variable-length block ciphers, encryption, block ciphers |
51 | Nicolas T. Courtois |
Cryptanalysis of Sfinks. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
solving systems of multivariate equations, fast algebraic attacks on stream ciphers, Boolean functions, stream ciphers, nonlinear filters, algebraic cryptanalysis |
50 | Nicolas Fournel, Marine Minier, Stéphane Ubéda |
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks. |
WISTP |
2007 |
DBLP DOI BibTeX RDF |
benchmarks, sensors, stream ciphers |
50 | Mohamed Amine Garici, Habiba Drias |
Cryptanalysis of Substitution Ciphers Using Scatter Search. |
IWINAC (2) |
2005 |
DBLP DOI BibTeX RDF |
automated cryptanalysis, substitution ciphers, genetic algorithm, heuristic search, optimization problem, scatter search, evolutionary approach |
50 | Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
IDEA and MESH ciphers, known-plaintext attack, Cryptanalysis |
50 | Jorge Nakahara Jr. |
Faster Variants of the MESH Block Ciphers. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
byte-oriented block ciphers, smart cards, algebraic attacks, IDEA |
50 | Nikhil Joshi, Kaijie Wu 0001, Ramesh Karri |
Concurrent Error Detection Schemes for Involution Ciphers. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Involutional ciphers, KHAZAD, Fault Tolerance, Concurrent Error Detection (CED) |
50 | Nicolas T. Courtois, Willi Meier |
Algebraic Attacks on Stream Ciphers with Linear Feedback. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Algebraic attacks on stream ciphers, factoring multivariate polynomials, overdefined problems, ciphertext-only attacks, Toyocrypt, Cryptrec, LILI-128, Boolean functions, nonlinear filtering, pseudo-random generators, Nessie, XL algorithm, multivariate equations |
50 | Palash Sarkar 0001 |
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
synchronous stream ciphers, nonlinear filter model, nonlinear combiner model, filter-combiner model, cellular automata, linear feedback shift registers |
49 | Adam J. Elbirt, Christof Paar |
Instruction-Level Distributed Processing for Symmetric-Key Cryptography. |
IPDPS |
2003 |
DBLP DOI BibTeX RDF |
algorithm-agility, FPGA, cryptography, VHDL, block cipher |
49 | Elad Barkan, Eli Biham |
In How Many Ways Can You Write Rijndael? |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
49 | Eli Biham |
Cryptanalysis of Ladder-DES. |
FSE |
1997 |
DBLP DOI BibTeX RDF |
|
45 | Gregor Leander, Erik Zenner, Philip Hawkes |
Cache Timing Analysis of LFSR-Based Stream Ciphers. |
IMACC |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Gordon Meiser, Thomas Eisenbarth 0001, Kerstin Lemke-Rust, Christof Paar |
Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers. |
SIES |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Gautham Sekar, Souradyuti Paul, Bart Preneel |
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Ermaliza Razali, Raphael C.-W. Phan, Marc Joye |
On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers. |
ProvSec |
2007 |
DBLP DOI BibTeX RDF |
pseudorandom permutation (PRP), key recovery (KR), related key attacks (RKA), block cipher, Provable security |
45 | Khoongming Khoo, Guang Gong, Hian-Kiat Lee |
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Time-memory-data trade-off attack, Rainbow attack, Maiorana-McFarland functions |
45 | Johannes Buchmann 0001, Andrei Pyshkin, Ralf-Philipp Weinmann |
Block Ciphers Sensitive to Gröbner Basis Attacks. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Imran Erguler, Emin Anarim |
A New Cryptanalytic Time-Memory Trade-Off for Stream Ciphers. |
ISCIS |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Adi Shamir |
Stream Ciphers: Dead or Alive? |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
45 | Jonathan J. Hoch, Adi Shamir |
Fault Analysis of Stream Ciphers. |
CHES |
2004 |
DBLP DOI BibTeX RDF |
Lili-128, SOBER-t32, Stream cipher, LFSR, fault attack, RC4 |
45 | Alex Biryukov |
Analysis of Involutional Ciphers: Khazad and Anubis. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
|
45 | Jorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle |
The MESH Block Ciphers. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
|
45 | Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram |
Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
45 | Ueli M. Maurer |
New Approaches to the Design of Self-Synchronizing Stream Ciphers. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
45 | Shimon Even, Oded Goldreich 0001 |
On the Power of Cascade Ciphers |
ACM Trans. Comput. Syst. |
1985 |
DBLP DOI BibTeX RDF |
|
42 | Shai Halevi, Don Coppersmith, Charanjit S. Jutla |
Scream: A Software-Efficient Stream Cipher. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
Round functions, Stream ciphers, Block ciphers, SEAL |
42 | Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen |
GEM: A Generic Chosen-Ciphertext Secure Encryption Method. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
generic conversion, stream ciphers, block ciphers, Public-key encryption, random oracle model, chosen-ciphertext security, hybrid encryption |
42 | Hideki Imai, Atsuhiro Yamagishi |
CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
cryptographic technology, asymmmetric ciphers, evaluation, symmetric ciphers |
42 | Joan Daemen, René Govaerts, Joos Vandewalle |
A Hardware Design Model for Cryptographic Algorithms. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
Hardware Cryptography, Pseudorandom Sequence Generators, Stream Ciphers, Block Ciphers, Cryptographic Hash Functions |
42 | Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel |
A New Approach to chi2 Cryptanalysis of Block Ciphers. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
? 2, square and linear cryptanalysis, Block ciphers |
42 | David Oranchak |
Evolutionary algorithm for decryption of monoalphabetic homophonic substitution ciphers encoded as constraint satisfaction problems. |
GECCO |
2008 |
DBLP DOI BibTeX RDF |
codebreaking, homophonic substitution, zodiac killer, zodiac murder ciphers, genetic algorithms, cryptography, evolutionary computing, constraint satisfaction |
42 | Shahram Khazaei, Willi Meier |
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Self-synchronizing Stream Ciphers, T-functions, Key Recovery |
42 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
The Security of Elastic Block Ciphers Against Key-Recovery Attacks. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Variable-length block ciphers, reduction proof, security analysis, key recovery attacks |
42 | Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson |
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
filter function, stream ciphers, initialization, algebraic attacks, clock-control |
42 | Alexander A. Moldovyan, Nick A. Moldovyan, Nicolas Sklavos 0001 |
Controlled elements for designing ciphers suitable to efficient VLSI implementation. |
Telecommun. Syst. |
2006 |
DBLP DOI BibTeX RDF |
Security, Block ciphers, Hardware implementation, Data-dependent operations |
42 | Pascal Junod, Serge Vaudenay |
FOX : A New Family of Block Ciphers. |
Selected Areas in Cryptography |
2004 |
DBLP DOI BibTeX RDF |
Lai-Massey scheme, Block ciphers |
42 | Howard M. Heys |
Analysis of the Statistical Cipher Feedback Mode of Block Ciphers. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
block cipher modes, Cryptography, synchronization, stream ciphers, error propagation |
42 | Alex Biryukov, Christophe De Cannière |
Block Ciphers and Systems of Quadratic Equations. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
Khazad, Misty, Block ciphers, linearization, Rijndael, Camellia, Serpent, multivariate quadratic equations |
42 | John Black, Phillip Rogaway |
Ciphers with Arbitrary Finite Domains. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
Provable security, Modes of Operation, Symmetric Encryption, Ciphers |
42 | Philip Hawkes, Gregory G. Rose |
Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
SOBER, t-class, SSC-II, cryptanalysis, stream ciphers |
42 | Vladimir V. Chepyzhov, Thomas Johansson 0001, Ben J. M. Smeets |
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
cryptanalysis, Stream ciphers, correlation attacks |
41 | Dirk Stegemann |
Extended BDD-Based Cryptanalysis of Keystream Generators. |
Selected Areas in Cryptography |
2007 |
DBLP DOI BibTeX RDF |
F-FCSR, cryptanalysis, Stream cipher, BDD, Trivium, Grain |
41 | Adam J. Elbirt, Christof Paar |
An Instruction-Level Distributed Processor for Symmetric-Key Cryptography. |
IEEE Trans. Parallel Distributed Syst. |
2005 |
DBLP DOI BibTeX RDF |
algorithm-agility, FPGA, Cryptography, VHDL, block cipher |
41 | Nicolas T. Courtois |
Algebraic Attacks on Combiners with Memory and Several Outputs. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Firdous Kausar, Ayesha Naureen |
A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
H-128, Wireless Sensor Network (WSN), Pervasive Computing, Stream Ciphers, Rabbit |
38 | Deike Priemuth-Schmid, Alex Biryukov |
Slid Pairs in Salsa20 and Trivium. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Salsa20, cryptanalysis, stream ciphers, eSTREAM, Trivium |
38 | Sondre Rønjom, Tor Helleseth |
The Linear Vector Space Spanned by the Nonlinear Filter Generator. |
SSC |
2007 |
DBLP DOI BibTeX RDF |
cyclic vector spaces, stream ciphers, m-sequences |
38 | Raphael C.-W. Phan, Mohammad Umar Siddiqi |
A Framework for Describing Block Cipher Cryptanalysis. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
framework, cryptanalysis, generalization, Encryption, block ciphers, distinguishers |
38 | Frédéric Didier, Jean-Pierre Tillich |
Computing the Algebraic Immunity Efficiently. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Low degree multiple, Boolean functions, Stream ciphers, Algebraic attacks, Algebraic immunity, Annihilator |
38 | Jovan Dj. Golic |
DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits. |
CHES |
2003 |
DBLP DOI BibTeX RDF |
Keyed reversible circuits, data scrambling, probing attacks, block ciphers, power analysis, countermeasures |
38 | Nick A. Moldovyan |
On Cipher Design Based on Switchable Controlled Operations. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
Fast Encryption, Hardware-Oriented Ciphers, Switchable Operations, Controlled Operations, Data-Dependent Operations |
38 | Lars R. Knudsen, David A. Wagner 0001 |
Integral Cryptanalysis. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
MISTY, integrals, Cryptanalysis, block ciphers |
38 | Anne Canteaut, Marion Videau |
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
higher order differential cryptanalysis, Boolean functions, Block ciphers, nonlinearity |
38 | Nicolas T. Courtois |
Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
overdefined systems of multivariate equations, MQ problem, Gröbner bases, ciphertext-only attacks, Toyocrypt-HR1, Toyocrypt-HS1, Cryptrec, stream ciphers, nonlinear filtering, pseudo-random generators, Multivariate cryptography, XL algorithm |
38 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Fast Correlation Attack Algorithm with List Decoding and an Application. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
nonlinear combiner, cryptanalysis, Stream ciphers, linear feedback shift registers, nonlinear filter, keystream generators |
38 | Helger Lipmaa |
IDEA: A Cipher For Multimedia Architectures? |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
multimedia architectures, Pentium MMX, block ciphers, IDEA, fast implementations |
37 | Zhiyuan Wang, Jianhua Huang, Ziming Guan |
The SOBER Family Ciphers Reconfigurable Processing Architecture Design. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin |
On Compression of Data Encrypted with Block Ciphers. |
DCC |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Dimitris Theodoropoulos, Alexandros Siskos, Dionisios N. Pnevmatikatos |
CCproc: A Custom VLIW Cryptography Co-processor for Symmetric-Key Ciphers. |
ARC |
2009 |
DBLP DOI BibTeX RDF |
Cryptography, VLIW, reconfigurable processors |
37 | Onur Özen, Kerem Varici, Cihangir Tezcan, Çelebi Kocair |
Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
Hight, Impossible Differential Attack, Present, Related-Key Attack, Rectangle Attack |
37 | Daniel J. Bernstein |
The Salsa20 Family of Stream Ciphers. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
security analysis, differential cryptanalysis, linear cryptanalysis |
37 | Yassin M. Hasan, Hesham A. Abulenein |
Key-linked block ciphers with input-output shuffling applied to remotely keyed encryption. |
COMSWARE |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum |
An Analysis of the Hermes8 Stream Ciphers. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Hermes8, Cryptanalysis, Stream Cipher |
37 | N. Nalini, G. Raghavendra Rao |
Cryptanalysis of Block Ciphers via Improved Simulated Annealing Technique. |
ICIT |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Sandeep S. Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer, Manfred Schimmler |
Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2657 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|