×

Found 24 Documents (Results 1–24)

Cryptanalysis of full sprout. (English) Zbl 1375.94142

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 663-682 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Observations on the SIMON block cipher family. (English) Zbl 1369.94546

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 161-185 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A generic approach to invariant subspace attacks: cryptanalysis of Robin, iSCREAM and Zorro. (English) Zbl 1370.94525

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 254-283 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the behaviors of affine equivalent Sboxes regarding differential and linear attacks. (English) Zbl 1365.94411

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 45-74 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

The Simon and Speck block ciphers on AVR 8-bit microcontrollers. (English) Zbl 1382.94059

Eisenbarth, Thomas (ed.) et al., Lightweight cryptography for security and privacy. Third international workshop, LightSec 2014, Istanbul, Turkey, September 1–2, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16362-8/pbk; 978-3-319-16363-5/ebook). Lecture Notes in Computer Science 8898, 3-20 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of KLEIN. (English) Zbl 1382.94132

Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 451-470 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Implementing lightweight block ciphers on x86 architectures. (English) Zbl 1362.94019

Lange, Tanja (ed.) et al., Selected areas in cryptography – SAC 2013. 20th international conference, Burnaby, BC, Canada, August 14–16, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43413-0/pbk; 978-3-662-43414-7/ebook). Lecture Notes in Computer Science 8282, 324-351 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Confused by confusion: systematic evaluation of DPA resistance of various S-boxes. (English) Zbl 1337.94062

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 374-390 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential power analysis in Hamming weight model: how to choose among (extended) affine equivalent S-boxes. (English) Zbl 1337.94069

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 360-373 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of reduced-round SIMON32 and SIMON48. (English) Zbl 1344.94077

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 143-160 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Cryptanalysis of iterated Even-Mansour schemes with two keys. (English) Zbl 1306.94048

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 439-457 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Multi-user collisions: applications to discrete logarithm, Even-Mansour and PRINCE. (English) Zbl 1306.94053

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 420-438 (2014).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

Automatic security evaluation and (related-key) differential characteristic search: application to SIMON, PRESENT, Lblock, DES(L) and other bit-oriented block ciphers. (English) Zbl 1306.94093

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 158-178 (2014).
MSC:  94A60 90C11
PDFBibTeX XMLCite
Full Text: DOI

Hashing mode using a lightweight blockcipher. (English) Zbl 1317.94120

Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 213-231 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

On the security of Piccolo lightweight block cipher against related-key impossible differentials. (English) Zbl 1295.94116

Paul, Goutam (ed.) et al., Progress in cryptology – INDOCRYPT 2013. 14th international conference on cryptology in India, Mumbai, India, December 7–10, 2013. Proceedings. Berlin: Springer (ISBN 978-3-319-03514-7/pbk). Lecture Notes in Computer Science 8250, 308-318 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Generic key recovery attack on Feistel scheme. (English) Zbl 1327.94052

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 464-485 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

FIDES: lightweight authenticated cipher with side-channel resistance for constrained hardware. (English) Zbl 1353.94038

Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems – CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 142-158 (2013).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

On bruteforce-like cryptanalysis: new meet-in-the-middle attacks in symmetric cryptanalysis. (English) Zbl 1293.94093

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 33-36 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

PRINCE – a low-latency block cipher for pervasive computing applications. Extended abstract. (English) Zbl 1292.94035

Wang, Xiaoyun (ed.) et al., Advances in cryptology – ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2–6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 208-225 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

Year of Publication

all top 3

Main Field

all top 3

Software