Cryptanalysis

Results: 756



#Item
281Differential cryptanalysis / Block cipher / Impossible differential cryptanalysis / E0 / Cryptanalysis / Known-plaintext attack / Chosen-plaintext attack / Advanced Encryption Standard / Ciphertext / Cryptography / Espionage / Boomerang attack

Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent John Kelsey1 , Tadayoshi Kohno2? , and Bruce Schneier1 1 Counterpane Internet Security, Inc.

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
282Data collection / Military intelligence / Signals intelligence / Traffic analysis / Cryptography / Cryptanalysis / Intelligence analysis / Signals intelligence in modern history / Ultra / National security / Espionage / Intelligence

FUNDAMENTALS OF TRAFFIC ANALYSIS (RADIO-TELEGRAPH); DEPARTMENT OF THE ARMY TECHNICAL MANUAL TM; DEPARTMENT OF THE AIR FORCE MANUAL AFM

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2015-04-24 17:57:13
283Constrained Application Protocol / Internet of Things / M2M / Computing / Cryptanalysis / Computer security / Intelligence agency / Differential cryptanalysis / Information / Security / Communication / Machine-to-Machine

M2M and IoT Protocols: MQTT, ALLJOYN, DDS and COAP: Why, Where and When Geoff Brown, CEO

Add to Reading List

Source URL: www.eclipsecon.org

Language: English - Date: 2015-04-13 10:57:43
284KASUMI / Block cipher / VEST / Feistel cipher / Linear cryptanalysis / SC2000 / Data Encryption Standard / Cryptography / Differential cryptanalysis / MISTY1

Security Evaluation of MISTY Structure with SPN Round Function Ruilin Li1 , Chao Li1,2 , Jinshu Su2 , and Bing Sun1,3 1 Department of Mathematics and System Science, Science College,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-01-17 09:45:21
285Key schedule / ICE / Differential cryptanalysis / Linear cryptanalysis / Advantage / Block cipher / Cryptography / SAFER / Advanced Encryption Standard

New Impossible Differential Attack on SAFER+ and SAFER++ Jingyuan Zhao1,2 , Meiqin Wang1,2 Jiazhe Chen1,2 , Yuliang Zheng1,2,3 1 3

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-01-03 02:21:46
286Key size / Symmetric-key algorithm / Block ciphers / LEX / Cryptanalysis / Ciphertext / Cipher / XSL attack / Serpent / Cryptography / Advanced Encryption Standard / Brute-force attack

Cryptanalysis of the Full AES Using GPU-Like Special-Purpose Hardware Alex Biryukov and Johann Großsch¨adl University of Luxembourg Laboratory of Algorithmics, Cryptology and Security (LACS) 6, rue Richard Coudenhove-K

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-12-30 14:28:01
287Advanced Encryption Standard / Cryptanalysis / Crypt / Advantage / Chosen-plaintext attack / Block cipher / Stream ciphers / Boomerang attack / Data Encryption Standard / Cryptography / Tiny Encryption Algorithm / University of Cambridge Computer Laboratory

Cryptanalysis of Round-Reduced LED Ivica Nikoli´c, Lei Wang and Shuang Wu Division of Mathematical Sciences, School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore {inikolic,wang.lei,w

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-05-05 23:11:43
288Block ciphers / CPU cache / Ciphertext / Side channel attack / Lookup table / ICE / UES / Cryptanalysis / Cellular Message Encryption Algorithm / Cryptography / Data Encryption Standard / Advanced Encryption Standard

Efficient Cache Attacks on AES, and Countermeasures Eran Tromer1 2 , Dag Arne Osvik3 and Adi Shamir2 1 Computer Science and Artificial Intelligence Laboratory, Massachusetts Institute of Technology,

Add to Reading List

Source URL: www.cs.tau.ac.il

Language: English - Date: 2009-06-25 15:56:23
289Homomorphic encryption / RSA / Mathematics / Lattice / Cyberwarfare / Applied mathematics / Ideal lattice cryptography / Cryptography / Electronic commerce / Public-key cryptography

Cryptanalysis of the Co-ACD Assumption Pierre-Alain Fouque1 , Moon Sung Lee2 , Tancr`ede Lepoint3 , and Mehdi Tibouchi4 1 Universit´e de Rennes 1 and Institut Universitaire de France, 2

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-02-12 19:26:06
290Weak key / Keystream / Linear feedback shift register / E0 / Tiny Encryption Algorithm / Grain / Cryptography / Stream ciphers / Pseudorandom number generators

Cryptanalysis of RAKAPOSHI Stream Cipher † Lin Ding, Jie Guan Zhengzhou Information Science and Technology Institute, China E-mail: ; Abstract. RAKAPOSHI is a hardware oriented

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2012-12-11 08:22:28
UPDATE