Cryptanalysis

Results: 756



#Item
91Tuple cryptanalysis of ARX with application to BLAKE and Skein J.-Ph. Aumasson G. Leurent W. Meier F. Mendel N. Mouha R. C-W Phan Y. Sasaki P. Susil

Tuple cryptanalysis of ARX with application to BLAKE and Skein J.-Ph. Aumasson G. Leurent W. Meier F. Mendel N. Mouha R. C-W Phan Y. Sasaki P. Susil

Add to Reading List

Source URL: 131002.net

Language: English - Date: 2012-08-14 06:47:10
    92Cryptanalysis of White Box DES Implementations⋆ Louis Goubin, Jean-Mi
hel Masereel, and Mi
haël Quisquater Versailles St-Quentin-en-Yvelines University 45 avenue des Etats-Unis FVersailles Cedex

    Cryptanalysis of White Box DES Implementations⋆ Louis Goubin, Jean-Mi hel Masereel, and Mi haël Quisquater Versailles St-Quentin-en-Yvelines University 45 avenue des Etats-Unis FVersailles Cedex

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2007-07-06 10:26:46
      93To appear in IEEE Transactions on Dependable and Secure Computing.  Cryptanalysis of a Privacy-Preserving Aggregation Protocol Amit Datta and Marc Joye

      To appear in IEEE Transactions on Dependable and Secure Computing. Cryptanalysis of a Privacy-Preserving Aggregation Protocol Amit Datta and Marc Joye

      Add to Reading List

      Source URL: joye.site88.net

      Language: English - Date: 2016-01-05 14:18:34
        94Cryptanalysis vs. Reality  + Small Cryptanalysis Jean-Philippe Aumasson http://net

        Cryptanalysis vs. Reality + Small Cryptanalysis Jean-Philippe Aumasson http://net

        Add to Reading List

        Source URL: 131002.net

        Language: English - Date: 2012-08-14 06:47:10
          95Cryptanalysis of ESSENCE∗ Mar´ıa Naya-Plasencia1 , Andrea R¨ock2,† , Jean-Philippe Aumasson3,‡ , Yann Laigle-Chapuy1 , Ga¨etan Leurent4 , Willi Meier5,§ , and Thomas Peyrin6 1  2

          Cryptanalysis of ESSENCE∗ Mar´ıa Naya-Plasencia1 , Andrea R¨ock2,† , Jean-Philippe Aumasson3,‡ , Yann Laigle-Chapuy1 , Ga¨etan Leurent4 , Willi Meier5,§ , and Thomas Peyrin6 1 2

          Add to Reading List

          Source URL: 131002.net

          Language: English - Date: 2012-08-14 06:46:48
            96Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1  3

            Cryptanalysis of Feistel Networks with Secret Round Functions ? Alex Biryukov1 , Gaëtan Leurent2 , and Léo Perrin3 1 3

            Add to Reading List

            Source URL: www.cryptolux.org

            Language: English - Date: 2015-10-09 09:52:07
              97Stream Cipher Cryptanalysis Algebraic Attacks Frederik Armknecht  University of Mannheim (Germany)

              Stream Cipher Cryptanalysis Algebraic Attacks Frederik Armknecht University of Mannheim (Germany)

              Add to Reading List

              Source URL: th.informatik.uni-mannheim.de

              Language: English - Date: 2003-08-15 07:57:30
                98Cryptanalytic Tools  Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias Schneider

                Cryptanalytic Tools Authors: Prof. Dr.-Ing. Tim Güneysu Dipl. Ing. Alexander Wild B. Sc. Tobias Schneider

                Add to Reading List

                Source URL: www.nds.rub.de

                Language: English - Date: 2015-12-11 07:25:27
                99AAECC 13, 17–Cryptanalysis of RSA with Small Prime Difference Benne de Weger

                AAECC 13, 17–Cryptanalysis of RSA with Small Prime Difference Benne de Weger

                Add to Reading List

                Source URL: deweger.xs4all.nl

                Language: English - Date: 2002-09-12 07:17:12