Cryptanalysis

Results: 756



#Item
411Cryptanalysis / Soviet Union / Politics / Security / Political history / Article 11 of the European Convention on Human Rights / Cheltenham / Government Communications Headquarters

Beyond BOURBON-1948: Fourth year of Allied Collaborative COMINT Effort against the Soviet Union

Add to Reading List

Source URL: archives.gov

Language: English - Date: 2013-09-25 17:41:37
412Statistics / PUF / Parametric model / Dimensional analysis / Cryptanalysis / Mathematical sciences / Probability and statistics / Physical Unclonable Function / Randomness / Statistical theory

Policy Gradients for Cryptanalysis Frank Sehnke1 , Christian Osendorfer1, Jan S¨ olter2 , 3,4 J¨ urgen Schmidhuber , and Ulrich R¨

Add to Reading List

Source URL: www6.in.tum.de

Language: English - Date: 2013-05-15 08:23:49
413Linear feedback shift register / Cube attack / Differential cryptanalysis / Key schedule / Trivium / Cryptography / Stream ciphers / Grain

Noname manuscript No. (will be inserted by the editor) Dynamic Cube Attack on 105 round Grain v1 Subhadeep Banik

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-11-26 18:35:08
414Linear algebra / Keccak / NIST hash function competition / Matrices / Linear map / Exponential function / Transformation matrix / Weight / Kernel / Mathematics / Algebra / Transformation

Characterization of Column Parity Kernel and Differential Cryptanalysis of Keccak Yin Tan, Kalikinkar Mandal and Guang Gong Department of Electrical and Computer Engineering, University of Waterloo, Canada {y24tan,kmanda

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2014-01-19 20:48:05
415Cryptographic hash functions / Cryptanalysis / Block cipher / Keystream / Cipher / Chosen-plaintext attack / Advanced Encryption Standard / DES-X / Classical cipher / Cryptography / Stream ciphers / Data Encryption Standard

Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE Itai Dinur ´ D´epartement d’Informatique, Ecole

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-25 03:00:27
416Coding theory / Advanced Encryption Standard / Side channel attack / Block cipher / Ciphertext / Known-plaintext attack / Hamming weight / Cryptanalysis / Cube attack / Cryptography / Espionage / Cyberwarfare

Error-Tolerant Algebraic Side-Channel Attacks Using BEE Ling Song1,2 , Lei Hu1,2 , Siwei Sun1,2 , Zhang Zhang2 ,Danping Shi1,2 , Ronglin Hao1,3 1 State Key Laboratory of Information Security,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-01 04:34:57
417ICE / Q / Affine arithmetic / Cryptography / Linear cryptanalysis / Advanced Encryption Standard

Analytic Toolbox for White-Box Implementations: Limitation and Perspectives Chung Hun Baek, Jung Hee Cheon, and Hyunsook Hong CHRI & Department of Mathematical Sciences, Seoul National University, 1 Gwanak-ro, Gwanak-gu,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-09-03 01:47:27
418McEliece cryptosystem / Post-quantum cryptography / Semantic security / Chosen-ciphertext attack / Cryptanalysis / Cryptographic hash function / Ciphertext / Niederreiter cryptosystem / Ciphertext indistinguishability / Cryptography / Public-key cryptography / Electronic commerce

A note on CCA2-protected McEliece cryptosystem with a systematic public key Pavol Zajac? UIM FEI STU, Ilkovicova 3, 81219 Bratislava, Slovakia [removed]

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-22 04:29:49
419Key schedule / ICE / Block cipher / FEAL / Cryptanalysis / VEST / Piling-up lemma / Differential-linear attack / Data Encryption Standard / Cryptography / Linear cryptanalysis / Differential cryptanalysis

Improved Linear Cryptanalysis of Round Reduced SIMON Javad Alizadeh1 , Hoda A. Alkhzaimi2 , Mohammad Reza Aref1 , Nasour Bagheri3 , Praveen Gauravaram4 , and Martin M. Lauridsen2 1 4

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-08-31 06:20:57
420Key size / National Security Agency / Cryptanalysis / Elliptic curve cryptography / Communications security / Public-key cryptography / Py / Key / NTRU / Cryptography / Key management / Stream ciphers

Microsoft PowerPoint - preneel_chinacrypt_aug14_v1.pptx

Add to Reading List

Source URL: homes.esat.kuleuven.be

Language: English - Date: 2014-08-28 01:07:14
UPDATE