Key-recovery attack

Results: 13



#Item
1Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1  6

Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1 6

Add to Reading List

Source URL: who.rocq.inria.fr

Language: English - Date: 2018-06-14 07:12:37
2Key Recovery Attack for ZHFE Daniel Cabarcas1 1 Daniel Smith-Tone2,3

Key Recovery Attack for ZHFE Daniel Cabarcas1 1 Daniel Smith-Tone2,3

Add to Reading List

Source URL: 2017.pqcrypto.org

Language: English - Date: 2017-06-28 17:40:46
    3Practical Key-Recovery Attack on MANTIS-5 Christoph Dobraunig FSE 2017 Maria Eichlseder

    Practical Key-Recovery Attack on MANTIS-5 Christoph Dobraunig FSE 2017 Maria Eichlseder

    Add to Reading List

    Source URL: www.nuee.nagoya-u.ac.jp

    Language: English - Date: 2017-03-06 01:05:30
      4Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1  6

      Key Recovery Attack against 2.5-round π-Cipher Christina Boura1 , Avik Chakraborti2 , Ga¨etan Leurent3 , Goutam Paul2 , Dhiman Saha4 , Hadi Soleimany5,6 and Valentin Suder7 1 6

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-05-23 08:52:57
        5Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

        Key Recovery Attacks against NTRU-based Somewhat Homomorphic Encryption Schemes Massimo Chenal Qiang Tang

        Add to Reading List

        Source URL: isc2015.item.ntnu.no

        Language: English - Date: 2015-09-20 14:16:36
        6A Practical Key Recovery Attack on Basic TCHo ? ?? Mathias Herrmann1 and Gregor Leander2 1

        A Practical Key Recovery Attack on Basic TCHo ? ?? Mathias Herrmann1 and Gregor Leander2 1

        Add to Reading List

        Source URL: www.cits.ruhr-uni-bochum.de

        Language: English - Date: 2015-09-04 08:48:10
          7A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae  PKC 2015, March 30 - April 1, Maryland, USA

          A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems Jean-Charles Faugère, Danilo Gligoroski, Ludovic Perret, Simona Samardjiska, Enrico Thomae PKC 2015, March 30 - April 1, Maryland, USA

          Add to Reading List

          Source URL: www.iacr.org

          Language: English - Date: 2015-03-29 21:02:40
          8The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Hal Abelson1 Ross Anderson2 Steven M. Bellovin3 Josh Benaloh4

          The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Hal Abelson1 Ross Anderson2 Steven M. Bellovin3 Josh Benaloh4

          Add to Reading List

          Source URL: www.cdt.org

          Language: English - Date: 2013-04-29 10:36:57
          9The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Hal Abelson1 Ross Anderson2 Steven M. Bellovin3 Josh Benaloh4

          The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption Hal Abelson1 Ross Anderson2 Steven M. Bellovin3 Josh Benaloh4

          Add to Reading List

          Source URL: www.schneier.com

          Language: English - Date: 2014-03-02 23:18:30
          10Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks Pierre-Alain Fouque1 and Thomas Vannet2 1  2

          Improving Key Recovery to 784 and 799 rounds of Trivium using Optimized Cube Attacks Pierre-Alain Fouque1 and Thomas Vannet2 1 2

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2015-04-06 01:10:53