Cryptanalysis

Results: 756



#Item
311Stream ciphers / Abstract algebra / Linear algebra / Cryptographic hash functions / Linear cryptanalysis / ICE / VEST / Q / Grain / Cryptography / Algebra / Mathematics

Higher-order cryptanalysis of LowMC Christoph Dobraunig, Maria Eichlseder, and Florian Mendel IAIK, Graz University of Technology, Austria Abstract. LowMC is a family of block ciphers dev

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-30 15:22:15
312Matrix theory / Linear algebra / Abstract algebra / Eigenvalues and eigenvectors / Principal component analysis / Matrix / Eigendecomposition of a matrix / Perron–Frobenius theorem / Algebra / Mathematics / Singular value decomposition

Template Attacks with a Power Model — Illustration on the Side-Channel Cryptanalysis of an Unprotected DES Crypto-Processor — Moulay Abdelaziz EL AABID Sylvain GUILLEY Philippe HOOGVORST

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-12-06 09:13:27
313Tuple / Type theory / Exponentiation / Mathematics / Data management / Mathematical notation

Cryptanalysis of REESSE1+ Public Key Cryptosystem Shengli Liu1 , Fangguo Zhang2 1 Dept. of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, P.R.China

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2007-03-11 21:36:43
314

Cryptanalysis of Daniel J. Bernstein and Tanja Lange Skein with full 72 rounds

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2011-02-13 18:27:56
    315Linear cryptanalysis / Block cipher / ICE / Blowfish / Lucifer / Differential cryptanalysis / Advanced Encryption Standard / Ciphertext / Feistel cipher / Cryptography / Data Encryption Standard / GOST

    Cryptanalysis of Symmetric Block Ciphers Based on the Feistel Network with Non-bijective S-boxes in the Round Function Roman Oliynykov Kharkov National University of Radioelectronics, Ukraine

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-12-16 10:47:29
    316SHA-1 / MD4 / MD5 / Differential cryptanalysis / RIPEMD / Hamming weight / A5/1 / ICE / Hash function / Cryptography / Error detection and correction / Cryptographic hash functions

    Finding good differential patterns for attacks on SHA-1 Krystian Matusiewicz and Josef Pieprzyk Centre for Advanced Computing - Algorithms and Cryptography, Department of Computing, Macquarie University, Sydney, NSW 2109

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2004-12-19 18:19:12
    317Block cipher / Ciphertext / Chosen-plaintext attack / Cipher / Stream cipher / Crypt / LEX / Linear cryptanalysis / NewDES / Cryptography / Advanced Encryption Standard / Key schedule

    Low Data Complexity Attacks on AES Charles Bouillaguet1 , Patrick Derbez1 , Orr Dunkelman2 , Nathan Keller2,⋆ , Vincent Rijmen3,4 , and Pierre-Alain Fouque1 1 D´epartement d’Informatique

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-02-23 12:55:44
    318Cryptanalysis / One-way function / Key / RSA / Password / Cryptographic protocol / Cryptosystem / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / One-time pad

    New Directions in Cryptography Invited Paper Whitfield Diffie and Martin E. Hellman Abstract Two kinds of contemporary developments in cryptography are examined. Widening applications of teleprocessing have given rise to

    Add to Reading List

    Source URL: www.cs.tau.ac.il

    Language: English - Date: 2001-12-26 10:46:32
    319Cryptanalysis / Block cipher / Boomerang attack / Chosen-plaintext attack / Ciphertext / Cryptography / Advanced Encryption Standard / Differential cryptanalysis

    New Impossible Differential Attacks on AES Jiqiang Lu1,⋆ , Orr Dunkelman2,⋆⋆ , Nathan Keller3,⋆ ⋆ ⋆ , and Jongsung Kim4,† 1 4

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2008-12-22 08:22:01
    320Feistel cipher / Block cipher / Differential cryptanalysis / SMS4 / Impossible differential cryptanalysis

    A Unified Method for Finding Impossible Differentials of Block Cipher Structures Yiyuan Luo1,2 , Zhongming Wu1 , Xuejia Lai1 and Guang Gong2 1 Department of Computer Science and Engineering, Shanghai Jiaotong University

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-09-06 23:14:46
    UPDATE