×

Found 33 Documents (Results 1–33)

A cellular automata based fault resistant MICKEY-like stream cipher. (English) Zbl 1520.68031

Chopard, Bastien (ed.) et al., Cellular automata. 15th international conference on cellular automata for research and industry, ACRI 2022, Geneva, Switzerland, September 12–15, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13402, 40-51 (2022).
MSC:  68P25 68Q80 94A60
PDFBibTeX XMLCite
Full Text: DOI

New general framework for algebraic degree evaluation of NFSR-based cryptosystems. (English) Zbl 07628059

Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 359-375 (2022).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Grain-128AEADv2: strengthening the initialization against key reconstruction. (English) Zbl 1493.94035

Conti, Mauro (ed.) et al., Cryptology and network security. 20th international conference, CANS 2021, Vienna, Austria, December 13–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13099, 24-41 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential fault based key recovery attacks on TRIAD. (English) Zbl 07497451

Hong, Deukjo (ed.), Information security and cryptology – ICISC 2020. 23rd international conference, Seoul, South Korea, December 2–4, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12593, 273-287 (2021).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles. (English) Zbl 1479.94259

Wu, Yongdong (ed.) et al., Information security and cryptology. 16th international conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12612, 453-465 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

sLiSCP: Simeck-based permutations for lightweight sponge cryptographic primitives. (English) Zbl 1384.94023

Adams, Carlisle (ed.) et al., Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). Lecture Notes in Computer Science 10719, 129-150 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A novel GPU-based implementation of the cube attack. (English) Zbl 1521.94040

Gollmann, Dieter (ed.) et al., Applied cryptography and network security. 15th international conference, ACNS 2017, Kanazawa, Japan, July 10–12, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10355, 184-207 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A volunteer-computing-based grid architecture incorporating idle resources of computational clusters. (English) Zbl 1390.68054

Dimov, Ivan (ed.) et al., Numerical analysis and its applications. 6th international conference, NAA 2016, Lozenetz, Bulgaria, June 15–22, 2016. Revised selected papers. Cham: Springer (ISBN 978-3-319-57098-3/pbk; 978-3-319-57099-0/ebook). Lecture Notes in Computer Science 10187, 769-776 (2017).
MSC:  68M07 68T20
PDFBibTeX XMLCite
Full Text: DOI

Comparison of cube attacks over different vector spaces. (English) Zbl 1376.94049

Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 225-238 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Cryptanalysis of full sprout. (English) Zbl 1375.94142

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 663-682 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

CASca: a CA based scalable stream cipher. (English) Zbl 1327.94047

Mohapatra, Ram N. (ed.) et al., Mathematics and computing. Selected papers based on the presentations at the 2nd international conference, ICMC, Haldia, India, January 5–10, 2015. New Delhi: Springer (ISBN 978-81-322-2451-8/hbk; 978-81-322-2452-5/ebook). Springer Proceedings in Mathematics & Statistics 139, 95-105 (2015).
MSC:  94A60 68Q80
PDFBibTeX XMLCite
Full Text: DOI

Remote IP protection using timing channels. (English) Zbl 1453.68025

Lee, Jooyoung (ed.) et al., Information security and cryptology – ICISC 2014. 17th international conference, Seoul, South Korea, December 3–5, 2014. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 8949, 222-237 (2015).
MSC:  68M25 68M12 94A60
PDFBibTeX XMLCite
Full Text: DOI

Improving key recovery to 784 and 799 rounds of Trivium using optimized cube attacks. (English) Zbl 1321.94058

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 502-517 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Conditional differential cryptanalysis of trivium and KATAN. (English) Zbl 1292.94095

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 200-212 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Combined differential and linear cryptanalysis of reduced-round PRINTcipher. (English) Zbl 1292.94089

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 169-184 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Breaking Grain-128 with dynamic cube attacks. (English) Zbl 1282.94042

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 167-187 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A 3-subset meet-in-the-middle attack: cryptanalysis of the lightweight block cipher KTANTAN. (English) Zbl 1292.94032

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 229-240 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cube attacks on tweakable black box polynomials. (English) Zbl 1239.94045

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 278-299 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Chosen IV statistical analysis for key recovery attacks on stream ciphers. (English) Zbl 1142.94343

Vaudenay, Serge (ed.), Progress in cryptology – AFRICACRYPT 2008. First international conference on cryptology in Africa, Casablanca, Morocco, June 11–14, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-68159-5/pbk). Lecture Notes in Computer Science 5023, 236-245 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software