Cryptanalysis

Results: 756



#Item
11

Authenticated Encryption Schemes and Cryptanalysis Jérémy Jean Laboratoire Crypto Agence Nationale de la Sécurité des Systèmes d’Information 26 avril 2017

Add to Reading List

Source URL: jc2-2017.inria.fr

Language: English - Date: 2017-05-09 09:15:41
    12

    Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR Tancrède Lepoint1 and Mehdi Tibouchi2 2 1

    Add to Reading List

    Source URL: www.chi.uni-hannover.de

    Language: English - Date: 2015-05-21 08:55:30
      13

      Computing Generator in Cyclotomic Integer Rings A subfield algorithm for the Principal Ideal Problem in L|∆K | and application to the cryptanalysis of a FHE scheme 1 2

      Add to Reading List

      Source URL: alexgelin.github.io

      Language: English - Date: 2018-07-18 08:05:29
        14

        kao’s “Toy Project” and Algebraic Cryptanalysis Dcoder February 17, 2012

        Add to Reading List

        Source URL: raw.githubusercontent.com

        Language: English
          15

          Subspace Trail Cryptanalysis and its Applications to AES Lorenzo Grassi, Christian Rechberger and Sondre Rønjom March, 2017

          Add to Reading List

          Source URL: www.nuee.nagoya-u.ac.jp

          Language: English - Date: 2017-03-06 00:03:12
            16

            Cryptanalysis Course Part I Tanja Lange Technische Universiteit Eindhoven 28 Nov 2016

            Add to Reading List

            Source URL: hyperelliptic.org

            Language: English - Date: 2016-11-28 06:26:07
              17

              Cryptanalysis of AVALANCHEv1 Andrey Bogdanov, Martin M. Lauridsen, and Elmar Tischhauser {anbog,mmeh,ewti}@dtu.dk DTU Compute, Technical University of Denmark, Denmark Abstract. AVALANCHEv1 [1] is a round-1 submission t

              Add to Reading List

              Source URL: martinlauridsen.info

              Language: English - Date: 2014-03-25 08:17:47
                18

                Cryptanalysis using GPUs Daniel J. Bernstein2 1 Tanja Lange1

                Add to Reading List

                Source URL: fmt.ewi.utwente.nl

                Language: English - Date: 2018-05-26 12:01:53
                  19

                  Practical Cryptanalysis of Json Web Token and Galois Counter Mode’s Implementations Quan Nguyen () Google Information Security Engineer (ISE) My Job

                  Add to Reading List

                  Source URL: rwc.iacr.org

                  Language: English - Date: 2017-05-31 03:05:40
                    20

                    Initial recommendations of long-term secure post-quantum systems Tanja Lange 07 September 2015 Dagstuhl Workshop on Quantum Cryptanalysis

                    Add to Reading List

                    Source URL: pqcrypto.eu.org

                    Language: English - Date: 2016-03-13 11:24:17
                      UPDATE