Cryptanalysis

Results: 756



#Item
1Cryptography / Data Encryption Standard / Feistel cipher / Block cipher / Tiny Encryption Algorithm / ICE / Format-preserving encryption / Skipjack

Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1 3

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
2Cryptography / Radio electronics / Block ciphers / KeeLoq / Rolling code / Data Encryption Standard / ICE

Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2009-09-22 19:00:54
3Cryptography / Side-channel attacks / Block ciphers / Advanced Encryption Standard / Power analysis / Cryptanalysis / International Data Encryption Algorithm

The Raymond and Beverly Sackler Faculty of Exact Sciences The Blavatnik School of Computer Science New Methods for Side Channel Cryptanalysis Thesis submitted in partial fulfilment of the requirements towards the M.Sc.

Add to Reading List

Source URL: www.ofirweisse.com

Language: English - Date: 2018-10-17 09:19:20
4Cryptography / Stream ciphers / Vigenre cipher / Ciphertext / Cryptanalysis / Caesar cipher

EECS 388 Intro to Computer Security September 16, 2016 Homework 2: Cryptanalysis

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2016-11-21 18:50:22
5Cryptography / Data Encryption Standard / Linear cryptanalysis / Differential cryptanalysis / Block cipher / Salsa20 / Cryptanalysis / Differential-linear attack / NC / Boomerang attack / Stream cipher / E0

Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Ga¨etan Leurent Inria, France Abstract. In this work we study the security of Chaskey, a recent

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
6Cryptocurrencies / Exonumia / Numismatics / Economy / Zcash / Bitcoin / Blockchain / Ethereum / Non-interactive zero-knowledge proof / Bitcoin Private

Zcash & Zerocash: Data mining, cryptanalysis and key reuse Killian Davitt, Lena Petersen March 25, 2018 Intro This document was written as part of the GA18 Cryptanalysis course to explain my work as part of Project PK.

Add to Reading List

Source URL: killiandavitt.me

Language: English - Date: 2018-10-05 08:41:07
7Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory / Block cipher / Data Encryption Standard / RC5 / Cryptanalysis / Keyword cipher / Churning / CPC Binary Barcode

Cryptanalysis of WIDEA Gaëtan Leurent UCL Crypto Group Abstract. WIDEA is a family of block ciphers designed by Junod and

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:40
8Cryptography / Data Encryption Standard / Differential cryptanalysis / Linear cryptanalysis / Cryptanalysis / ICE / Differential-linear attack

Chaskey ARX Cryptanalysis Improved Differential-Linear

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:34
9Algebra / Mathematics / Abstract algebra / Algebraic geometry / Commutative algebra / Asymptotic analysis / Mathematical series / Grbner basis / Invariant theory / Generating function / Big O notation / Hilbert series and Hilbert polynomial

LNCSOn Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis

Add to Reading List

Source URL: precision.moscito.org

Language: English - Date: 2011-03-20 04:03:40
10

Cryptanalysis of Daniel J. Bernstein and Tanja Lange Skein with full 72 rounds

Add to Reading List

Source URL: fse2011.mat.dtu.dk

- Date: 2011-02-14 02:32:24
    UPDATE