91![Tuple cryptanalysis of ARX with application to BLAKE and Skein J.-Ph. Aumasson G. Leurent W. Meier F. Mendel N. Mouha R. C-W Phan Y. Sasaki P. Susil Tuple cryptanalysis of ARX with application to BLAKE and Skein J.-Ph. Aumasson G. Leurent W. Meier F. Mendel N. Mouha R. C-W Phan Y. Sasaki P. Susil](https://www.pdfsearch.io/img/e9b45d5f75b3fb2a5c2172c488196ff3.jpg) | Add to Reading ListSource URL: 131002.netLanguage: English - Date: 2012-08-14 06:47:10
|
---|
92![Cryptanalysis of White Box DES Implementations⋆ Louis Goubin, Jean-Mi
hel Masereel, and Mi
haël Quisquater Versailles St-Quentin-en-Yvelines University 45 avenue des Etats-Unis FVersailles Cedex Cryptanalysis of White Box DES Implementations⋆ Louis Goubin, Jean-Mi
hel Masereel, and Mi
haël Quisquater Versailles St-Quentin-en-Yvelines University 45 avenue des Etats-Unis FVersailles Cedex](https://www.pdfsearch.io/img/d32cee24182713e3b6882568332df740.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2007-07-06 10:26:46
|
---|
93![To appear in IEEE Transactions on Dependable and Secure Computing. Cryptanalysis of a Privacy-Preserving Aggregation Protocol Amit Datta and Marc Joye To appear in IEEE Transactions on Dependable and Secure Computing. Cryptanalysis of a Privacy-Preserving Aggregation Protocol Amit Datta and Marc Joye](https://www.pdfsearch.io/img/5c2c9ae0e8581259d29ab208d5e0200a.jpg) | Add to Reading ListSource URL: joye.site88.netLanguage: English - Date: 2016-01-05 14:18:34
|
---|
94![Cryptanalysis vs. Reality + Small Cryptanalysis Jean-Philippe Aumasson http://net Cryptanalysis vs. Reality + Small Cryptanalysis Jean-Philippe Aumasson http://net](https://www.pdfsearch.io/img/ceec1238284cdc6d0e2fde2c9ae8a560.jpg) | Add to Reading ListSource URL: 131002.netLanguage: English - Date: 2012-08-14 06:47:10
|
---|
95![Cryptanalysis of ESSENCE∗ Mar´ıa Naya-Plasencia1 , Andrea R¨ock2,† , Jean-Philippe Aumasson3,‡ , Yann Laigle-Chapuy1 , Ga¨etan Leurent4 , Willi Meier5,§ , and Thomas Peyrin6 1 2 Cryptanalysis of ESSENCE∗ Mar´ıa Naya-Plasencia1 , Andrea R¨ock2,† , Jean-Philippe Aumasson3,‡ , Yann Laigle-Chapuy1 , Ga¨etan Leurent4 , Willi Meier5,§ , and Thomas Peyrin6 1 2](https://www.pdfsearch.io/img/62c1c431231a08b47d4c7d825c157ea9.jpg) | Add to Reading ListSource URL: 131002.netLanguage: English - Date: 2012-08-14 06:46:48
|
---|
96![Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1 3 Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1 3](https://www.pdfsearch.io/img/407731b21a356930a71e442d68bab14a.jpg) | Add to Reading ListSource URL: www.cryptolux.orgLanguage: English - Date: 2015-10-09 09:52:07
|
---|
97![Stream Cipher Cryptanalysis Algebraic Attacks Frederik Armknecht University of Mannheim (Germany) Stream Cipher Cryptanalysis Algebraic Attacks Frederik Armknecht University of Mannheim (Germany)](https://www.pdfsearch.io/img/b6b5d48acb29108d752c3c07a14c8a45.jpg) | Add to Reading ListSource URL: th.informatik.uni-mannheim.deLanguage: English - Date: 2003-08-15 07:57:30
|
---|
98![Cryptanalytic Tools Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias Schneider Cryptanalytic Tools Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias Schneider](https://www.pdfsearch.io/img/83e46849583c1ad2e61784b6f8a18d54.jpg) | Add to Reading ListSource URL: www.nds.rub.deLanguage: English - Date: 2015-12-11 07:25:27
|
---|
99![AAECC 13, 17–Cryptanalysis of RSA with Small Prime Difference Benne de Weger AAECC 13, 17–Cryptanalysis of RSA with Small Prime Difference Benne de Weger](https://www.pdfsearch.io/img/1b322c4d523a6d222ec8e2c7516c6331.jpg) | Add to Reading ListSource URL: deweger.xs4all.nlLanguage: English - Date: 2002-09-12 07:17:12
|
---|