Cryptanalysis

Results: 756



#Item
391Post-quantum cryptography / Linear algebra / NTRUSign / GGH signature scheme / GGH encryption scheme / Lattice reduction / Lattice / Parallelepiped / Vector space / Cryptography / Algebra / Mathematics

Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures Phong Q. Nguyen?1 and Oded Regev??2 ´ CNRS & Ecole normale sup´erieure, DI, 45 rue d’Ulm, 75005 Paris, France.

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 01:06:09
392Caro-Kann Defence / Wade Defence / Chess openings / Chess / Sicilian Defence

Cryptanalysis of 3-pass HAVAL? Bart Van Rompay, Alex Biryukov, Bart Preneel?? , and Joos Vandewalle Katholieke Universiteit Leuven, Dept. ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {bart.vanr

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
393Cipher / Feistel cipher / Symmetric-key algorithm / QUAD / Public-key cryptography / Cryptanalysis / Vigenère cipher / Index of cryptography articles / Cryptography / Stream ciphers / Block cipher

A Traceable Block Cipher Olivier Billet and Henri Gilbert France T´el´ecom R&D 38-40, rue du G´en´eral Leclerc[removed]Issy les Moulineaux Cedex 9 - France {olivier.billet,henri.gilbert}@francetelecom.com

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
394Advanced Encryption Standard / SHARK / Integral cryptanalysis / ICE / Key schedule / Linear cryptanalysis / Differential cryptanalysis / International Data Encryption Algorithm / VEST / Cryptography / Block ciphers / KHAZAD

A New Attack Against Khazad Frédéric Muller DCSSI Crypto Lab, 18 rue du Docteur Zamenhof F[removed]Issy-les-Moulineaux Cedex, France [removed]

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:54
395Algorithm / Linear cryptanalysis / Modulo / Addition / Mathematics / Group theory / Modular arithmetic

A More Explicit Formula for Linear Probabilities of Modular Addition Modulo a Power of Two S. M. Dehnavi1, A. Mahmoodi Rishakani2, M. R. Mirzaee Shamsabad3 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 14:28:49
396VEST / Keccak / Differential cryptanalysis / Q / Advanced Encryption Standard / Cryptography / Stream ciphers / Linear cryptanalysis

Cryptanalysis of Ascon Christoph Dobraunig1 , Maria Eichlseder1 , Florian Mendel1 , and Martin Schl¨affer2 1 IAIK, Graz University of Technology, Austria

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-13 17:37:58
397Differential cryptanalysis / Block cipher / Weak key / Ciphertext / Cryptanalysis / Advanced Encryption Standard / Key / Cryptographic protocols / Cryptographically secure pseudorandom number generator / Cryptography / Key management / Cryptographic nonce

On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks Christoph Dobraunig, Maria Eichlseder, Stefan Mangard, and Florian Mendel IAIK, Graz University of Technology, Austria Abstract. At AFRICAC

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-15 01:45:03
398Lattice points / Linear algebra / Computational number theory / Homomorphic encryption / Orthogonality / Lenstra–Lenstra–Lovász lattice basis reduction algorithm / Lattice / Private information retrieval / Paillier cryptosystem / Cryptography / Algebra / Mathematics

Cryptanalysis of a (Somewhat) Additively Homomorphic Encryption Scheme Used in PIR Tancrède Lepoint1 and Mehdi Tibouchi2 2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-09 03:49:32
399ICE / Cube attack / Ciphertext / Stream cipher / Trivium / Cipher / KN-Cipher / Crab / Cryptography / Block cipher / Key schedule

Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN Zahra Ahmadian, Shahram Rasoolzadeh, Mahmoud Salmasizadeh, and Mohammad Reza Aref Sharif University of Technology, Tehran, Iran. {ahmadian,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-01-16 05:28:42
400MISTY1 / Boomerang attack / Key schedule / Feistel cipher / ICE / Differential cryptanalysis / E0 / A5/1 / Block cipher / Cryptography / KASUMI / Stream ciphers

A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony Orr Dunkelman, Nathan Keller, and Adi Shamir Faculty of Mathematics and Computer Science Weizmann Institute of Science

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-01-10 13:51:33
UPDATE