×

Found 362 Documents (Results 1–100)

Moving a step of ChaCha in syncopated rhythm. (English) Zbl 07799259

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 273-304 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A greater GIFT: strengthening GIFT against statistical cryptanalysis. (English) Zbl 1496.94065

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13277, 115-144 (2022).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Revisit two memoryless state-recovery cryptanalysis methods on A5/1. (English) Zbl 1492.94169

Yu, Yu (ed.) et al., Information security and cryptology. 17th international conference, Inscrypt 2021, virtual event, August 12–14, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13007, 191-211 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Exploring semi-bent Boolean functions arising from cellular automata. (English) Zbl 1492.68092

Gwizdałła, Tomasz M. (ed.) et al., Cellular automata. 14th international conference on cellular automata for research and industry, ACRI 2020, Lodz, Poland, December 2–4, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12599, 56-66 (2021).
MSC:  68Q80 94A60 94D10
PDFBibTeX XMLCite
Full Text: DOI arXiv

Bagua: a NFSR-based stream cipher constructed following confusion and diffusion principles. (English) Zbl 1479.94259

Wu, Yongdong (ed.) et al., Information security and cryptology. 16th international conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12612, 453-465 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Quantum stream ciphers: impossibility of unconditionally strong algorithms. (English. Russian original) Zbl 1453.81014

J. Math. Sci., New York 252, No. 1, 90-103 (2021); translation from Itogi Nauki Tekh., Ser. Sovrem. Mat. Prilozh., Temat. Obz. 151, 91-104 (2018).
PDFBibTeX XMLCite
Full Text: DOI

Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD. (English) Zbl 1479.94187

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 466-495 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential random fault attacks on certain CAESAR stream ciphers. (English) Zbl 1457.94194

Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 297-315 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Cryptography with shrinking generators. Fundamentals and applications of keystream sequence generators based on irregular decimation. (English) Zbl 1503.94003

SpringerBriefs in Mathematics; SBMAC SpringerBriefs. Cham: Springer; Rio de Janeiro: Sociedade Brasileira de Matemática Aplicada e Computacional (SBMAC) (ISBN 978-3-030-12849-4/pbk; 978-3-030-12850-0/ebook). xi, 101 p. (2019).
PDFBibTeX XMLCite
Full Text: DOI

Rapid hardware design for cryptographic modules with filtering structures over small finite fields. (English) Zbl 1446.94167

Budaghyan, Lilya (ed.) et al., Arithmetic of finite fields. 7th international workshop, WAIFI 2018, Bergen, Norway, June 14–16, 2018. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11321, 128-145 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Distributed time-memory tradeoff attacks on ciphers (with application to stream ciphers and counter mode). (English) Zbl 1444.94070

Susilo, Willy (ed.) et al., Information security and privacy. 23rd Australasian conference, ACISP 2018, Wollongong, NSW, Australia, July 11–13, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10946, 135-153 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fast near collision attack on the Grain v1 stream cipher. (English) Zbl 1428.94099

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10821, 771-802 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Distinguishing attacks on (ultra-)lightweight WG ciphers. (English) Zbl 1412.94180

Bogdanov, Andrey (ed.), Lightweight cryptography for security and privacy. 5th international workshop, LightSec 2016, Aksaray, Turkey, September 21–22, 2016. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10098, 45-59 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

MILP-based cube attack on the reduced-round WG-5 lightweight stream cipher. (English) Zbl 1397.94094

O’Neill, Máire (ed.), Cryptography and coding. 16th IMA international conference, IMACC 2017, Oxford, UK, December 12–14, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-71044-0/pbk; 978-3-319-71045-7/ebook). Lecture Notes in Computer Science 10655, 333-351 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Stream ciphers: a practical solution for efficient homomorphic-ciphertext compression. (English) Zbl 1387.94071

Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 313-333 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Attacks against filter generators exploiting monomial mappings. (English) Zbl 1387.94072

Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 78-98 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Simulating auxiliary inputs, revisited. (English) Zbl 1369.94567

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 159-179 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

A guess-then-algebraic attack on LFSR-based stream ciphers with nonlinear filter. (English) Zbl 1366.94546

Hui, K. (ed.) et al., Information and communications security. 16th international conference, ICICS 2014, Hong Kong, China, December 16–17, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-21965-3/pbk; 978-3-319-21966-0/ebook). Lecture Notes in Computer Science 8958, 132-142 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Graph based cubical multivariate maps and their cryptographical applications. (English) Zbl 1370.94519

Beshaj, Lubjana (ed.) et al., Advances on superelliptic curves and their applications. Based on the NATO Advanced Study Institute (ASI), Ohrid, Macedonia, 2014. Amsterdam: IOS Press (ISBN 978-1-61499-519-7/hbk; 978-1-61499-520-3/ebook). NATO Science for Peace and Security Series D: Information and Communication Security 41, 305-327 (2015).
MSC:  94A60 05C90
PDFBibTeX XMLCite
Full Text: DOI

Another tradeoff attack on sprout-like stream ciphers. (English) Zbl 1382.94171

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 561-585 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On provable security of wPRF-based leakage-resilient stream ciphers. (English) Zbl 1388.94079

Au, Man-Ho (ed.) et al., Provable security. 9th international conference, ProvSec 2015, Kanazawa, Japan, November 24–26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-26058-7/pbk; 978-3-319-26059-4/ebook). Lecture Notes in Computer Science 9451, 391-411 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fast correlation attacks over extension fields, large-unit linear approximation and cryptanalysis of SNOW 2.0. (English) Zbl 1375.94163

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 643-662 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Optimizing the placement of tap positions. (English) Zbl 1401.94167

Ors, Berna (ed.) et al., Cryptography and information security in the Balkans. First international conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16–17, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-21355-2/pbk; 978-3-319-21356-9/ebook). Lecture Notes in Computer Science 9024, 15-30 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

On lightweight stream ciphers with shorter internal states. (English) Zbl 1382.94050

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 451-470 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Revised algorithms for computing algebraic immunity against algebraic and fast algebraic attacks. (English) Zbl 1336.94056

Chow, Sherman S. M. (ed.) et al., Information security. 17th international conference, ISC 2014, Hong Kong, China, October 12–14, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-13256-3/pbk). Lecture Notes in Computer Science 8783, 104-119 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Some randomness experiments on TRIVIUM. (English) Zbl 1404.94109

Chakraborty, Rajat Subhra (ed.) et al., Security, privacy, and applied cryptography engineering. 4th international conference, SPACE 2014, Pune, India, October 18–22, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12059-1/pbk). Lecture Notes in Computer Science 8804, 219-236 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Near collision attack on the Grain v1 stream cipher. (English) Zbl 1321.94097

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 518-538 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linear cryptanalysis of FASER128/256 and TriviA-ck. (English) Zbl 1337.94081

Meier, Willi (ed.) et al., Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 237-254 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Low data complexity inversion attacks on stream ciphers via truncated compressed preimage sets. (English) Zbl 1337.94091

Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 131-147 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On increasing the throughput of stream ciphers. (English) Zbl 1294.94025

Benaloh, Josh (ed.), Topics in cryptology – CT-RSA 2014. The cryptographer’s track at the RSA conference 2014, San Francisco, CA, USA, February 25–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-04851-2/pbk). Lecture Notes in Computer Science 8366, 132-151 (2014).
MSC:  94A55 94A60
PDFBibTeX XMLCite
Full Text: DOI

1-resiliency of bipermutive cellular automata rules. (English) Zbl 1336.68170

Kari, Jarkko (ed.) et al., Cellular automata and discrete complex systems. 19th international workshop, AUTOMATA 2013, Gießen, Germany, September 17–19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40866-3/pbk). Lecture Notes in Computer Science 8155, 110-123 (2013).
MSC:  68Q80 94A60
PDFBibTeX XMLCite
Full Text: DOI

The mathematics of encryption. An elementary introduction. (English) Zbl 1284.94001

Mathematical World 29. Providence, RI: American Mathematical Society (AMS) (ISBN 978-0-8218-8321-1/pbk; 978-1-4704-1594-5/ebook). xvii, 332 p. (2013).
PDFBibTeX XMLCite
Full Text: DOI

Real time cryptanalysis of Bluetooth encryption with condition masking. (Extended abstract). (English) Zbl 1310.94174

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 165-182 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of helix and phelix revisited. (English) Zbl 1316.94087

Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1–3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 27-40 (2013).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Improved key recovery attacks on reduced-round Salsa20 and ChaCha. (English) Zbl 1342.94096

Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 337-351 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software