Cryptanalysis

Results: 756



#Item
121Distribution Cryptanalysis Kaisa Nyberg Department of Information and Computer Science Aalto University School of Science  June 11, 2013

Distribution Cryptanalysis Kaisa Nyberg Department of Information and Computer Science Aalto University School of Science June 11, 2013

Add to Reading List

Source URL: ice.mat.dtu.dk

Language: English - Date: 2013-06-18 08:31:59
    122Foundations of cryptanalysis: on Boolean functions Anne Canteaut  http://www-rocq.inria.fr/secret/Anne.Canteaut/

    Foundations of cryptanalysis: on Boolean functions Anne Canteaut http://www-rocq.inria.fr/secret/Anne.Canteaut/

    Add to Reading List

    Source URL: ice.mat.dtu.dk

    Language: English - Date: 2013-06-06 12:37:32
      123Improved Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN Danping Shi1,2,3 , Lei Hu1,2? , Siwei Sun1,2 , Ling Song1,2 1  State Key Laboratory of Information Security, Institute of Information Engineering,

      Improved Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN Danping Shi1,2,3 , Lei Hu1,2? , Siwei Sun1,2 , Ling Song1,2 1 State Key Laboratory of Information Security, Institute of Information Engineering,

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-11-21 00:31:39
        124A Few Techniques for Block Cipher Cryptanalysis

        A Few Techniques for Block Cipher Cryptanalysis

        Add to Reading List

        Source URL: web.spms.ntu.edu.sg

        Language: English - Date: 2012-03-13 12:15:13
          125Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis [Published in IEEE Transactions on Computers 49(9):, Sung-Ming Yen1 and Marc Joye2 1

          Checking Before Output May Not Be Enough Against Fault-Based Cryptanalysis [Published in IEEE Transactions on Computers 49(9):, Sung-Ming Yen1 and Marc Joye2 1

          Add to Reading List

          Source URL: joye.site88.net

          Language: English - Date: 2015-09-04 19:44:15
            126Stream cipher cryptanalysis Anne Canteaut  http://www-rocq.inria.fr/secret/Anne.Canteaut/  Ice Break 2013

            Stream cipher cryptanalysis Anne Canteaut http://www-rocq.inria.fr/secret/Anne.Canteaut/ Ice Break 2013

            Add to Reading List

            Source URL: ice.mat.dtu.dk

            Language: English - Date: 2013-06-11 11:42:42
              127Advan
ed Methods in Side Channel Cryptanalysis Kai S
hramm July 2006

              Advan ed Methods in Side Channel Cryptanalysis Kai S hramm July 2006

              Add to Reading List

              Source URL: www.emsec.rub.de

              Language: English - Date: 2010-04-20 21:54:16
                128Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 ¨ Leurent2 , Florian Mendel3 , Mar´ıa Praveen Gauravaram1 , Gaeten 4

                Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512 ¨ Leurent2 , Florian Mendel3 , Mar´ıa Praveen Gauravaram1 , Gaeten 4

                Add to Reading List

                Source URL: 2010.africacrypt.com

                Language: English - Date: 2010-05-06 01:47:12
                  129ISCOn Security of a White-Box Implementation of SHARK  Yang SHI and Hongfei FAN

                  ISCOn Security of a White-Box Implementation of SHARK Yang SHI and Hongfei FAN

                  Add to Reading List

                  Source URL: isc2015.item.ntnu.no

                  Language: English - Date: 2015-09-20 14:17:24
                  130Linear Cryptanalysis Kaisa Nyberg Department of Information and Computer Science Aalto University School of Science  June 6, 2013

                  Linear Cryptanalysis Kaisa Nyberg Department of Information and Computer Science Aalto University School of Science June 6, 2013

                  Add to Reading List

                  Source URL: ice.mat.dtu.dk

                  Language: English - Date: 2013-06-07 10:08:29