## Found 20 Documents (Results 1–20)

100
MathJax
Newest 1st

### Theoretical security evaluation against side-channel cube attack with key enumeration. (English)Zbl 1454.94076

Lange, Tanja (ed.) et al., Progress in cryptology – LATINCRYPT 2017. 5th international conference on cryptology and information security in Latin America, Havana, Cuba, September 20–22, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11368, 145-165 (2019).
MSC:  94A60
Full Text:

MSC:  94A60
Full Text:

### GIFT: a small present. Towards reaching the limit of lightweight encryption. (English)Zbl 1450.94026

Fischer, Wieland (ed.) et al., Cryptographic hardware and embedded systems – CHES 2017. 19th international conference, Taipei, Taiwan, September 25–28, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10529, 321-345 (2017).
MSC:  94A60
Full Text:

### Integral attack against bit-oriented block ciphers. (English)Zbl 1384.94114

Kwon, Soonhak (ed.) et al., Information security and cryptology – ICISC 2015. 18th international conference, Seoul, South Korea, November 25–27, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-30839-5/pbk; 978-3-319-30840-1/ebook). Lecture Notes in Computer Science 9558, 102-118 (2016).
MSC:  94A60
Full Text:

### A new classification of 4-bit optimal S-boxes and its application to PRESENT, RECTANGLE and SPONGENT. (English)Zbl 1382.94172

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 494-515 (2015).
MSC:  94A60
Full Text:

### Linear distinguishers in the key-less setting: application to PRESENT. (English)Zbl 1367.94323

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 217-240 (2015).
MSC:  94A60
Full Text:

### Improved slender-set linear cryptanalysis. (English)Zbl 1382.94135

Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 431-450 (2015).
MSC:  94A60
Full Text:

MSC:  94A60
Full Text:

### Improved differential fault analysis on PRESENT-80/128. (English)Zbl 1291.94106

MSC:  94A60 68P25
Full Text:

### Estimating the probabilities of low-weight differential and linear approximations on PRESENT-like ciphers. (English)Zbl 1342.94066

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 368-382 (2013).
MSC:  94A60
Full Text:

### A model for structure attacks, with applications to PRESENT and Serpent. (English)Zbl 1312.94098

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 49-68 (2012).
MSC:  94A60
Full Text:

### Lightweight cryptography for the cloud: exploit the power of bitslice implementation. (English)Zbl 1294.94063

Prouff, Emmanuel (ed.) et al., Cryptographic hardware and embedded systems - CHES 2012. 14th international workshop, Leuven, Belgium, September 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33026-1/pbk). Lecture Notes in Computer Science 7428, 408-425 (2012).
MSC:  94A60 68P25
Full Text:

### Extending higher-order integral: an efficient unified algorithm of constructing integral distinguishers for block ciphers. (English)Zbl 1319.94087

Bao, Feng (ed.) et al., Applied cryptography and network security. 10th international conference, ACNS 2012, Singapore, June 26–29, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31283-0/pbk). Lecture Notes in Computer Science 7341, 117-134 (2012).
MSC:  94A60
Full Text:

### Linear cryptanalysis using multiple linear approximations. (English)Zbl 1293.94073

Junod, Pascal (ed.) et al., Advanced linear cryptanalysis of block and stream ciphers. Amsterdam: IOS Press (ISBN 978-1-60750-843-4/hbk; 978-1-60750-844-1/ebook). Cryptology and Information Security Series 7, 29-53 (2011).
MSC:  94A60
Full Text:

### EPCBC – a block cipher suitable for electronic product code encryption. (English)Zbl 1307.94111

Lin, Dongdai (ed.) et al., Cryptology and network security. 10th international conference, CANS 2011, Sanya, China, December 10–12, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25512-0/pbk). Lecture Notes in Computer Science 7092, 76-97 (2011).
MSC:  94A60
Full Text:

### Cryptanalysis of PRESENT-like ciphers with secret S-boxes. (English)Zbl 1307.94038

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 270-289 (2011).
MSC:  94A60
Full Text:

### Multiple differential cryptanalysis: theory and practice. (English)Zbl 1282.94034

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 35-54 (2011).
MSC:  94A60
Full Text:

### Algebraic techniques in differential cryptanalysis revisited. (English)Zbl 1295.94149

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 120-141 (2011).
MSC:  94A60 94A62
Full Text:

### The block cipher companion. (English)Zbl 1243.68010

Information Security and Cryptography. Berlin: Springer (ISBN 978-3-642-17341-7/hbk; 978-3-642-17342-4/ebook). xiv, 267 p. (2011).
Full Text:

### Multi-trail statistical saturation attacks. (English)Zbl 1315.94066

Zhou, Jianying (ed.) et al., Applied cryptography and network security. 8th international conference, ACNS 2010, Beijing, China, June 22–25, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13707-5/pbk). Lecture Notes in Computer Science 6123, 123-138 (2010).
MSC:  94A60
Full Text:

all top 5

all top 3