-
1
-
-
84857758140
-
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
-
Miri, A., Vaudenay, S. (eds.) SAC 2011. Springer, Heidelberg
-
Ågren, M.: Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64. In: Miri, A., Vaudenay, S. (eds.) SAC 2011. LNCS, vol. 7118, pp. 217-233. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.7118
, pp. 217-233
-
-
Ågren, M.1
-
2
-
-
70350385117
-
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
-
Dunkelman, O. (ed.) FSE 2009. Springer, Heidelberg
-
Aumasson, J.-P., Dinur, I., Meier, W., Shamir, A.: Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. In: Dunkelman, O. (ed.) FSE 2009. LNCS, vol. 5665, pp. 1-22. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5665
, pp. 1-22
-
-
Aumasson, J.-P.1
Dinur, I.2
Meier, W.3
Shamir, A.4
-
3
-
-
84957608539
-
Differential Cryptanalysis of Lucifer
-
Stinson, D.R. (ed.) CRYPTO 1993. Springer, Heidelberg
-
Ben-Aroya, I., Biham, E.: Differential Cryptanalysis of Lucifer. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 187-199. Springer, Heidelberg (1994)
-
(1994)
LNCS
, vol.773
, pp. 187-199
-
-
Ben-Aroya, I.1
Biham, E.2
-
4
-
-
79952610354
-
A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN
-
Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. Springer, Heidelberg
-
Bogdanov, A., Rechberger, C.: A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol. 6544, pp. 229-240. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6544
, pp. 229-240
-
-
Bogdanov, A.1
Rechberger, C.2
-
5
-
-
67349265781
-
PolyBoRi: A framework for Groebner-basis computations with Boolean polynomials
-
Brickenstein, M., Dreyer, A.: PolyBoRi: A framework for Groebner-basis computations with Boolean polynomials. Journal of Symbolic Computation 44(9), 1326-1345 (2009)
-
(2009)
Journal of Symbolic Computation
, vol.44
, Issue.9
, pp. 1326-1345
-
-
Brickenstein, M.1
Dreyer, A.2
-
6
-
-
33750241980
-
Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles
-
Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. Springer, Heidelberg
-
De Cannière, C.: trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. In: Katsikas, S.K., López, J., Backes, M., Gritzalis, S., Preneel, B. (eds.) ISC 2006. LNCS, vol. 4176, pp. 171-186. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4176
, pp. 171-186
-
-
De Cannière, C.1
-
7
-
-
70350589237
-
KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers
-
Clavier, C., Gaj, K. (eds.) CHES 2009. Springer, Heidelberg
-
De Cannière, C., Dunkelman, O., Kneževič, M.: KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. In: Clavier, C., Gaj, K. (eds.) CHES 2009. LNCS, vol. 5747, pp. 272-288. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5747
, pp. 272-288
-
-
De Cannière, C.1
Dunkelman, O.2
Kneževič, M.3
-
8
-
-
67650699727
-
Cube Attacks on Tweakable Black Box Polynomials
-
Joux, A. (ed.) EUROCRYPT 2009. Springer, Heidelberg
-
Dinur, I., Shamir, A.: Cube Attacks on Tweakable Black Box Polynomials. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 278-299. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5479
, pp. 278-299
-
-
Dinur, I.1
Shamir, A.2
-
9
-
-
79959996376
-
Breaking Grain-128 with Dynamic Cube Attacks
-
Joux, A. (ed.) FSE 2011. Springer, Heidelberg
-
Dinur, I., Shamir, A.: Breaking Grain-128 with Dynamic Cube Attacks. In: Joux, A. (ed.) FSE 2011. LNCS, vol. 6733, pp. 167-187. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6733
, pp. 167-187
-
-
Dinur, I.1
Shamir, A.2
-
11
-
-
45449101664
-
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
-
Vaudenay, S. (ed.) AFRICACRYPT 2008. Springer, Heidelberg
-
Fischer, S., Khazaei, S., Meier, W.: Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers. In: Vaudenay, S. (ed.) AFRICACRYPT 2008. LNCS, vol. 5023, pp. 236-245. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5023
, pp. 236-245
-
-
Fischer, S.1
Khazaei, S.2
Meier, W.3
-
12
-
-
78650841310
-
Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems
-
Abe, M. (ed.) ASIACRYPT 2010. Springer, Heidelberg
-
Knellwolf, S., Meier, W., Naya-Plasencia, M.: Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems. In: Abe, M. (ed.) ASIACRYPT 2010. LNCS, vol. 6477, pp. 130-145. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6477
, pp. 130-145
-
-
Knellwolf, S.1
Meier, W.2
Naya-Plasencia, M.3
-
13
-
-
0041863249
-
Higher order derivatives and differential cryptanalysis
-
Blahut, R.E., Costello, D.J., Maurer, U., Mittelholzer, T. (eds.) Kluwer Academic Publishers
-
Lai, X.: Higher order derivatives and differential cryptanalysis. In: Blahut, R.E., Costello, D.J., Maurer, U., Mittelholzer, T. (eds.) Communicationis and Cryptography: Two Sides of one Tapestry, pp. 227-233. Kluwer Academic Publishers (1994)
-
(1994)
Communicationis and Cryptography: Two Sides of One Tapestry
, pp. 227-233
-
-
Lai, X.1
-
14
-
-
38549124306
-
Two Trivial Attacks on Trivium
-
Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. Springer, Heidelberg
-
Maximov, A., Biryukov, A.: Two Trivial Attacks on Trivium. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 36-55. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4876
, pp. 36-55
-
-
Maximov, A.1
Biryukov, A.2
-
15
-
-
78651077262
-
Greedy Distinguishers and Nonrandomness Detectors
-
Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. Springer, Heidelberg
-
Stankovski, P.: Greedy Distinguishers and Nonrandomness Detectors. In: Gong, G., Gupta, K.C. (eds.) INDOCRYPT 2010. LNCS, vol. 6498, pp. 210-226. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6498
, pp. 210-226
-
-
Stankovski, P.1
|