×

Found 98 Documents (Results 1–98)

Improved differential analysis of block cipher PRIDE. (English) Zbl 1403.94088

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 209-219 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Partial prime factor exposure attacks on RSA and its Takagi’s variant. (English) Zbl 1403.94074

Lopez, Javier (ed.) et al., Information security practice and experience. 11th international conference, ISPEC 2015, Beijing, China, May 5–8, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-17532-4/pbk; 978-3-319-17533-1/ebook). Lecture Notes in Computer Science 9065, 96-108 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Implicit factorization of RSA moduli revisited (short paper). (English) Zbl 1398.94150

Tanaka, Keisuke (ed.) et al., Advances in information and computer security. 10th international workshop on security, IWSEC 2015, Nara, Japan, August 26–28, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22424-4/pbk; 978-3-319-22425-1/ebook). Lecture Notes in Computer Science 9241, 67-76 (2015).
MSC:  94A60 11Y16
PDFBibTeX XMLCite
Full Text: DOI

Extending the applicability of the mixed-integer programming technique in automatic differential cryptanalysis. (English) Zbl 1397.94099

Lopez, Javier (ed.) et al., Information security. 18th international conference, ISC 2015, Trondheim, Norway, September 9–11, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-23317-8/pbk; 978-3-319-23318-5/ebook). Lecture Notes in Computer Science 9290, 141-157 (2015).
MSC:  94A60 90C11
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of variants of RSA with multiple small secret exponents. (English) Zbl 1367.94338

Biryukov, Alex (ed.) et al., Progress in cryptology – INDOCRYPT 2015. 16th international conference on cryptology in India, Bangalore, India, December 6–9, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26616-9/pbk; 978-3-319-26617-6/ebook). Lecture Notes in Computer Science 9462, 105-123 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Attacking RSA with a composed decryption exponent using unravelled linearization. (English) Zbl 1400.94150

Lin, Dongdai (ed.) et al., Information security and cryptology. 10th international conference, Inscrypt 2014, Beijing, China, December 13–15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16744-2/pbk; 978-3-319-16745-9/ebook). Lecture Notes in Computer Science 8957, 207-219 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Match box meet-in-the-middle attacks on the SIMON family of block ciphers. (English) Zbl 1382.94162

Eisenbarth, Thomas (ed.) et al., Lightweight cryptography for security and privacy. Third international workshop, LightSec 2014, Istanbul, Turkey, September 1–2, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16362-8/pbk; 978-3-319-16363-5/ebook). Lecture Notes in Computer Science 8898, 140-151 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Automatic security evaluation of block ciphers with S-bP structures against related-key differential attacks. (English) Zbl 1347.94060

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 39-51 (2014).
MSC:  94A60 90C11
PDFBibTeX XMLCite
Full Text: DOI

Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers. (English) Zbl 1306.94093

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 158-178 (2014).
MSC:  94A60 90C11
PDFBibTeX XMLCite
Full Text: DOI

Partial key exposure attacks on Takagi’s variant of RSA. (English) Zbl 1353.94054

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 134-150 (2014).
MSC:  94A60 11Y16
PDFBibTeX XMLCite
Full Text: DOI

Further improvement of factoring RSA moduli with implicit hint. (English) Zbl 1288.94081

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 165-177 (2014).
MSC:  94A60 11Y05
PDFBibTeX XMLCite
Full Text: DOI

Implicit polynomial recovery and cryptanalysis of a combinatorial key cryptosystem. (English) Zbl 1406.94083

Chim, Tat Wing (ed.) et al., Information and communications security. 14th international conference, ICICS 2012, Hong Kong, China, October 29–31, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34128-1/pbk). Lecture Notes in Computer Science 7618, 45-57 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Concurrent non-malleable witness indistinguishable argument from any one-way function. (English) Zbl 1293.94076

Wu, Chuan-Kun (ed.) et al., Information security and cryptology. 7th international conference, Inscrypt 2011, Beijing, China, November 30–December 3, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34703-0/pbk). Lecture Notes in Computer Science 7537, 363-378 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cube cryptanalysis of Hitag2 stream cipher. (English) Zbl 1307.94102

Lin, Dongdai (ed.) et al., Cryptology and network security. 10th international conference, CANS 2011, Sanya, China, December 10–12, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25512-0/pbk). Lecture Notes in Computer Science 7092, 15-25 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

How to construct secure and efficient three-party password-based authenticated key exchange protocols. (English) Zbl 1295.94151

Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 218-235 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

A new family of quadriphase sequences with low correlation. (English) Zbl 1248.65003

Chee, Yeow Meng (ed.) et al., Coding and cryptology. Third international workshop, IWCC 2011, Qingdao, China, May 30 – June 3, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-20900-0/pbk). Lecture Notes in Computer Science 6639, 246-262 (2011).
MSC:  65C10 94A45 94A55
PDFBibTeX XMLCite
Full Text: DOI

Kipnis-Shamir attack on unbalanced oil-vinegar scheme. (English) Zbl 1326.94079

Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 168-180 (2011).
MSC:  94A60 11T71 94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of two quartic encryption schemes and one improved MFE scheme. (English) Zbl 1284.94061

Sendrier, Nicolas (ed.), Post-quantum cryptography. Third international workshop, PQCrypto 2010, Darmstadt, Germany, May 25–28, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12928-5/pbk). Lecture Notes in Computer Science 6061, 41-60 (2010).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Kipnis-Shamir attack on HFE revisited. (English) Zbl 1166.94318

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 399-411 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Provably secure \(N\)-party authenticated key exchange in the multicast DPWA setting. (English) Zbl 1166.94344

Pei, Dingyi (ed.) et al., Information security and cryptology. Third SKLOIS conference, Inscrypt 2007, Xining, China, August 31–September 5, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-79498-1/pbk). Lecture Notes in Computer Science 4990, 93-107 (2008).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the TRMC-4 public key cryptosystem. (English) Zbl 1214.94053

Katz, Jonathan (ed.) et al., Applied cryptography and network security. 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72737-8/pbk). Lecture Notes in Computer Science 4521, 104-115 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Analysis of the SMS4 block cipher. (English) Zbl 1213.94121

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 158-170 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New description of SMS4 by an embedding over GF(\(2^{8}\)). (English) Zbl 1153.94397

Srinathan, K. (ed.) et al., Progress in cryptology – INDOCRYPT 2007. 8th international conference on cryptology in India, Chennai, India, December 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77025-1/pbk). Lecture Notes in Computer Science 4859, 238-251 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A new family of Gold-like sequences. (English) Zbl 1154.94363

Golomb, Solomon W. (ed.) et al., Sequences, subsequences, and consequences. International workshop, SSC 2007, Los Angeles, CA, USA, May 31–June 2, 2007. Revised invited papers. Berlin: Springer (ISBN 978-3-540-77403-7/pbk). Lecture Notes in Computer Science 4893, 62-69 (2007).
MSC:  94A55
PDFBibTeX XMLCite
Full Text: DOI

High order linearization equation (hole) attack on multivariate public key cryptosystems. (English) Zbl 1161.94395

Okamoto, Tatsuaki (ed.) et al., Public key cryptography – PKC 2007. 10th international conference on practice and theory in public-key cryptography, Beijing, China, April 16–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-71676-1/pbk). Lecture Notes in Computer Science 4450, 233-248 (2007).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Partially perfect nonlinear functions and a construction of cryptographic Boolean functions. (English) Zbl 1152.94423

Gong, Guang (ed.) et al., Sequences and their applications – SETA 2006. 4th international conference, Beijing, China, September 24–28, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-44523-4/pbk). Lecture Notes in Computer Science 4086, 402-416 (2006).
MSC:  94A60 06E30
PDFBibTeX XMLCite
Full Text: DOI

On the expected value of the joint 2-adic complexity of periodic binary multisequences. (English) Zbl 1152.94388

Gong, Guang (ed.) et al., Sequences and their applications – SETA 2006. 4th international conference, Beijing, China, September 24–28, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-44523-4/pbk). Lecture Notes in Computer Science 4086, 199-208 (2006).
MSC:  94A55 68Q25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient and provably secure generic construction of three-party password-based authenticated key exchange protocols. (English) Zbl 1175.94119

Barua, Rana (ed.) et al., Progress in cryptology – INDOCRYPT 2006. 7th international conference on cryptology in India, Kolkata, India, December 11-13, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49767-7/pbk). Lecture Notes in Computer Science 4329, 118-132 (2006).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Breaking a new instance of TTM cryptosystems. (English) Zbl 1151.94555

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 4th international conference, ACNS 2006, Singapore, June 6–9, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34703-8/pbk). Lecture Notes in Computer Science 3989, 210-225 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A novel method for constructing almost perfect polyphase sequences. (English) Zbl 1151.94469

Ytrehus, Øyvind (ed.), Coding and cryptography. International workshop, WCC 2005, Bergen, Norway, March 14–18, 2005. Revised selected papers. Berlin: Springer (ISBN 3-540-35481-6/pbk). Lecture Notes in Computer Science 3969, 346-353 (2006).
MSC:  94A55
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software