1![Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1 3 Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1 3](https://www.pdfsearch.io/img/ec2fe85a77e347574abf0f71901fa081.jpg) | Add to Reading ListSource URL: who.rocq.inria.frLanguage: English - Date: 2018-06-14 07:12:34
|
---|
2![Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1 Cryptanalysis of KeeLoq with COPACOBANA Martin Novotný1,2, Timo Kasper1 Horst Görtz Institute for IT-Security Ruhr University Bochum 1](https://www.pdfsearch.io/img/4174bea91854d93ee223da334b3e80a9.jpg) | Add to Reading ListSource URL: www.hyperelliptic.orgLanguage: English - Date: 2009-09-22 19:00:54
|
---|
3![The Raymond and Beverly Sackler Faculty of Exact Sciences The Blavatnik School of Computer Science New Methods for Side Channel Cryptanalysis Thesis submitted in partial fulfilment of the requirements towards the M.Sc. The Raymond and Beverly Sackler Faculty of Exact Sciences The Blavatnik School of Computer Science New Methods for Side Channel Cryptanalysis Thesis submitted in partial fulfilment of the requirements towards the M.Sc.](https://www.pdfsearch.io/img/b98fa1ea7facdd69cdedbe805f534ba9.jpg) | Add to Reading ListSource URL: www.ofirweisse.comLanguage: English - Date: 2018-10-17 09:19:20
|
---|
4![EECS 388 Intro to Computer Security September 16, 2016 Homework 2: Cryptanalysis EECS 388 Intro to Computer Security September 16, 2016 Homework 2: Cryptanalysis](https://www.pdfsearch.io/img/79dc978261e3142dff1f28ad8cc77f7d.jpg) | Add to Reading ListSource URL: www.eecs.umich.eduLanguage: English - Date: 2016-11-21 18:50:22
|
---|
5![Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Ga¨etan Leurent Inria, France Abstract. In this work we study the security of Chaskey, a recent Improved Differential-Linear Cryptanalysis of 7-round Chaskey with Partitioning Ga¨etan Leurent Inria, France Abstract. In this work we study the security of Chaskey, a recent](https://www.pdfsearch.io/img/2369fe643bb6ca44ca32fb92cfbc3c2c.jpg) | Add to Reading ListSource URL: who.rocq.inria.frLanguage: English - Date: 2018-06-14 07:12:34
|
---|
6![Zcash & Zerocash: Data mining, cryptanalysis and key reuse Killian Davitt, Lena Petersen March 25, 2018 Intro This document was written as part of the GA18 Cryptanalysis course to explain my work as part of Project PK. Zcash & Zerocash: Data mining, cryptanalysis and key reuse Killian Davitt, Lena Petersen March 25, 2018 Intro This document was written as part of the GA18 Cryptanalysis course to explain my work as part of Project PK.](https://www.pdfsearch.io/img/7357a66032180620757b4b1ac7ff20e5.jpg) | Add to Reading ListSource URL: killiandavitt.meLanguage: English - Date: 2018-10-05 08:41:07
|
---|
7![Cryptanalysis of WIDEA Gaëtan Leurent UCL Crypto Group Abstract. WIDEA is a family of block ciphers designed by Junod and Cryptanalysis of WIDEA Gaëtan Leurent UCL Crypto Group Abstract. WIDEA is a family of block ciphers designed by Junod and](https://www.pdfsearch.io/img/fa6d60d27d0d2c9fe02a7e8796e0c264.jpg) | Add to Reading ListSource URL: who.rocq.inria.frLanguage: English - Date: 2018-06-14 07:12:40
|
---|
8![Chaskey ARX Cryptanalysis Improved Differential-Linear Chaskey ARX Cryptanalysis Improved Differential-Linear](https://www.pdfsearch.io/img/35540d57c28b941fb15f1a25c10cb89f.jpg) | Add to Reading ListSource URL: who.rocq.inria.frLanguage: English - Date: 2018-06-14 07:12:34
|
---|
9![LNCSOn Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis LNCSOn Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis](https://www.pdfsearch.io/img/bb14d7f224f1ac74665911850b5e0039.jpg) | Add to Reading ListSource URL: precision.moscito.orgLanguage: English - Date: 2011-03-20 04:03:40
|
---|
10![Cryptanalysis of Daniel J. Bernstein and Tanja Lange
Skein with full 72 rounds Cryptanalysis of Daniel J. Bernstein and Tanja Lange
Skein with full 72 rounds](https://www.pdfsearch.io/img/3489866687d2093652490000bc89842c.jpg) | Add to Reading ListSource URL: fse2011.mat.dtu.dk- Date: 2011-02-14 02:32:24
|
---|