×

Found 11 Documents (Results 1–11)

Truncated boomerang attacks and application to AES-based ciphers. (English) Zbl 1528.94033

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14007, 3-35 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

QCB: efficient quantum-secure authenticated encryption. (English) Zbl 1514.94046

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 668-698 (2021).
MSC:  94A60 81P94
PDFBibTeX XMLCite
Full Text: DOI

Quantum linearization attacks. (English) Zbl 1522.81069

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 422-452 (2021).
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the GPRS encryption algorithms GEA-1 and GEA-2. (English) Zbl 1479.94125

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 155-183 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New results on \(\mathsf{Gimli}\): full-permutation distinguishers and improved collisions. (English) Zbl 1511.94100

Moriai, Shiho (ed.) et al., Advances in cryptology – ASIACRYPT 2020. 26th international conference on the theory and application of cryptology and information security, Daejeon, South Korea, December 7–11, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12491, 33-63 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Out of oddity – new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems. (English) Zbl 1504.94105

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 299-328 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The Missing Difference problem, and its applications to counter mode encryption. (English) Zbl 1428.94084

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10821, 745-770 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

MD4 is not one-way. (English) Zbl 1154.68400

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 412-428 (2008).
MSC:  68P25 68N99 94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

all top 3

Software