Cryptanalysis

Results: 756



#Item
101Tuple cryptanalysis of ARX with application to BLAKE and Skein Jean-Philippe Aumasson1 , Ga¨etan Leurent2 , Willi Meier3,∗ , Florian Mendel4 , Nicky Mouha5,6,† , Raphael C.-W. Phan7 , Yu Sasaki8 , and Petr Susil9 1

Tuple cryptanalysis of ARX with application to BLAKE and Skein Jean-Philippe Aumasson1 , Ga¨etan Leurent2 , Willi Meier3,∗ , Florian Mendel4 , Nicky Mouha5,6,† , Raphael C.-W. Phan7 , Yu Sasaki8 , and Petr Susil9 1

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:46:43
    102Bug Attacks Eli Biham1 Yaniv Carmeli1  Adi Shamir2

    Bug Attacks Eli Biham1 Yaniv Carmeli1 Adi Shamir2

    Add to Reading List

    Source URL: iacr.org

    Language: English - Date: 2010-11-05 17:58:40
    103Applications of SAT Solvers to Cryptanalysis of Hash Functions Ilya Mironov and Lintao Zhang Microsoft Research, Silicon Valley Campus {mironov,lintaoz}@microsoft.com

    Applications of SAT Solvers to Cryptanalysis of Hash Functions Ilya Mironov and Lintao Zhang Microsoft Research, Silicon Valley Campus {mironov,lintaoz}@microsoft.com

    Add to Reading List

    Source URL: research.microsoft.com

    Language: English - Date: 2006-07-23 22:24:46
      104Parallel Cryptanalysis  Ruben Niederhagen Parallel Cryptanalysis

      Parallel Cryptanalysis Ruben Niederhagen Parallel Cryptanalysis

      Add to Reading List

      Source URL: polycephaly.org

      Language: English - Date: 2012-06-13 05:18:56
        105Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis Subhabrata Samajder and Palash Sarkar Applied Statistics Unit Indian Statistical Institute 203, B.T.Road, Kolkata, India. {subhabrata r,pa

        Rigorous Upper Bounds on Data Complexities of Block Cipher Cryptanalysis Subhabrata Samajder and Palash Sarkar Applied Statistics Unit Indian Statistical Institute 203, B.T.Road, Kolkata, India. {subhabrata r,pa

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-09-21 04:21:44
          106Uitnodiging Parallel Cryptanalysis Tot het bijwonen van de openbare verdediging van mijn proefschrift

          Uitnodiging Parallel Cryptanalysis Tot het bijwonen van de openbare verdediging van mijn proefschrift

          Add to Reading List

          Source URL: polycephaly.org

          - Date: 2012-06-13 05:18:57
            107Cryptanalysis of Symmetric-Key Primitives: Automated Techniques

            Cryptanalysis of Symmetric-Key Primitives: Automated Techniques

            Add to Reading List

            Source URL: www.cosic.esat.kuleuven.be

            Language: English - Date: 2012-05-31 02:20:38
              108Published in Electronics Letters , Vol. 34, No. 18, pp. 1738–1739, SeptemberImproved authenticated multiple-key agreement protocol  Cryptanalysis of Harn-Lin scheme: One straightforward modification of the abov

              Published in Electronics Letters , Vol. 34, No. 18, pp. 1738–1739, SeptemberImproved authenticated multiple-key agreement protocol Cryptanalysis of Harn-Lin scheme: One straightforward modification of the abov

              Add to Reading List

              Source URL: joye.site88.net

              Language: English - Date: 2015-09-04 19:44:16
                109Scientific Report  First name / Family name Dr. Dimitrios Simos

                Scientific Report First name / Family name Dr. Dimitrios Simos

                Add to Reading List

                Source URL: fellowship.ercim.eu

                Language: English - Date: 2013-02-27 04:48:46
                110ISSNPrint) ISSNOnline) Computer Science for Fun  Issue 14

                ISSNPrint) ISSNOnline) Computer Science for Fun Issue 14

                Add to Reading List

                Source URL: www.cs4fn.org

                Language: English - Date: 2012-11-21 11:20:28