Cryptanalysis

Results: 756



#Item
211Boomerang attack / Advantage / Ciphertext / Meet-in-the-middle attack / Stream cipher / Chosen-plaintext attack / Advanced Encryption Standard / Cryptanalysis / Block cipher / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Security Analysis of PRINCE J´er´emy Jean1? , Ivica Nikoli´c2 , Thomas Peyrin2 , Lei Wang2 and Shuang Wu2 ´ Ecole Normale Sup´erieure, France Division of Mathematical Sciences, School of Physical and Mathematical Sc

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 23:59:39
212Public-key cryptography / Domain name system / Internet standards / Domain Name System Security Extensions / Key size / Key / Brute-force attack / Cryptanalysis / Key generation / Cryptography / Key management / Internet protocols

DNSSEC Key Maintenance Analysis_final

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:07:09
213Advanced Encryption Standard / Key schedule / Linear cryptanalysis / GOST / Differential-linear attack / Cipher / ICE / Serpent / Cryptanalysis / Cryptography / Block ciphers / Differential cryptanalysis

SEA a Scalable Encryption Algorithm for Small Embedded Applications Fran¸cois-Xavier Standaert1,2 , Gilles Piret1 , Neil Gershenfeld2 , Jean-Jacques Quisquater1 1

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:02
214Quantum cryptography / Theoretical computer science / Key management / Quantum computer / Key size / Quantum algorithm / NTRU / Public-key cryptography / Cryptanalysis / Cryptography / Applied mathematics / Quantum information science

Quantum Computing and Cryptography

Add to Reading List

Source URL: www.entrust.com

Language: English - Date: 2013-05-03 16:46:34
215Cryptographic software / Tor / Internet / Onion routing / Blind signature / Group signature / Computing / Internet privacy / Cryptography / Software

Cryptanalysis of a fair anonymity for the tor network Amadou Moctar Kane KSecurity, BP 47136, Dakar, Senegal.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 17:40:02
216Alan Turing / Turing machine / Colossus computer / Bombe / Enigma machine / Lorenz cipher / Gordon Welchman / Known-plaintext attack / Cryptanalysis / Cryptography / Espionage / Bletchley Park

FEATURE ALAN TURING, COLOSSUS, AND TURING MACHINES We’re taking a break from our Olde Code series this issue to get some background on a man who was in the news as recently as last year. Juliet Kemp looks back at the

Add to Reading List

Source URL: www.linuxvoice.com

Language: English - Date: 2015-02-09 09:27:27
217Cube attack / Tiny Encryption Algorithm / Correlation attack / Linear feedback shift register / Trivium / Key schedule / ICE / Differential cryptanalysis / NLFSR / Cryptography / Stream ciphers / Grain

A New Distinguisher on Grain v1 for 106 rounds Santanu Sarkar Department of Mathematics, Indian Institute of Technology, Sardar Patel Road, Chennai, India.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-15 10:23:44
218Mathematical sciences / Polynomial / QUAD / Time complexity / Cryptanalysis / Multivariate cryptography / Cryptography / Applied mathematics / Computational complexity theory

A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae PKC 2015, March 30 - April 1, Maryland, USA

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2015-03-29 21:02:40
219Differential-linear attack / Boomerang attack / Truncated differential cryptanalysis / Cryptanalysis / ICE / Key schedule / Impossible differential cryptanalysis / XSL attack / Data Encryption Standard / Cryptography / Differential cryptanalysis / Linear cryptanalysis

The 128-bit Blockcipher CLEFIA Security and Performance Evaluations Revision 1.0 June 1, 2007

Add to Reading List

Source URL: www.sony.co.jp

Language: English - Date: 2011-03-09 03:41:21
220Cube attack / Cipher / Public-key cryptography / Encryption / International Data Encryption Algorithm / Authenticated encryption / Cryptographic hash function / Cryptography / Homomorphic encryption / Cryptanalysis

PROGRAM EUROCRYPT 2015 MONDAY, April 27th 9:00 9:15 Welcome

Add to Reading List

Source URL: www.cosic.esat.kuleuven.be

Language: English - Date: 2015-04-16 13:21:14
UPDATE