Search

Your search keyword '"Key-Recovery Attack"' showing total 261 results

Search Constraints

Start Over You searched for: Descriptor "Key-Recovery Attack" Remove constraint Descriptor: "Key-Recovery Attack"
261 results on '"Key-Recovery Attack"'

Search Results

1. Quantum Attacks on MIBS Block Cipher Based on Bernstein–Vazirani Algorithm.

4. Truncated Differential Attacks On Symmetric Primitives With Linear Key Schedule: WARP And Orthros.

5. Exploiting ROLLO's constant-time implementations with a single-trace analysis.

6. Quantum Attacks on MIBS Block Cipher Based on Bernstein–Vazirani Algorithm

7. Cryptanalysis of Ivanov–Krouk–Zyablov Cryptosystem

8. Improved Differential Attack on Round-Reduced LEA

9. Improved key-recovery attacks on reduced-round WEM-8.

10. Probabilistic Mixture Differential Cryptanalysis on Round-Reduced AES

11. Lattice Attacks on NTRU Revisited

12. A Key-Recovery Attack on 855-round Trivium

13. MixColumns Properties and Attacks on (Round-Reduced) AES with a Single Secret S-Box

14. Improved Meet-in-the-Middle Attacks on Generic Feistel Constructions

15. Applications of Simon's algorithm in quantum attacks on Feistel variants.

16. Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced AES

17. Security analysis of secure kNN and ranked keyword search over encrypted data.

18. A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors

19. On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks

20. Subspace Trail Cryptanalysis and its Applications to AES

21. Improved Parameter Estimates for Correlation and Capacity Deviates in Linear Cryptanalysis

22. A Key Recovery Reaction Attack on QC-MDPC.

23. Truncated Differential Analysis of Reduced-Round LBlock

24. A Simple Key-Recovery Attack on McOE-X

25. New Truncated Differential Cryptanalysis on 3D Block Cipher

26. The 7-Round Subspace Trail-Based Impossible Differential Distinguisher of Midori-64

27. A theoretical investigation on the distinguishers of Salsa and ChaCha

28. Cryptanalysis of a Code-Based Signature Scheme Based on the Schnorr-Lyubashevsky Framework

29. Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation

30. Cryptanalysis of Achterbahn-128/80

31. Towards Key-recovery-attack Friendly Distinguishers: Application to GIFT-128

32. SMT‐based cube attack on round‐reduced Simeck32/64

33. White-Box Implementation of Shamir’s Identity-Based Signature Scheme

34. Proving the biases of Salsa and ChaCha in differential attack

35. An Efficient MQ-Signature Scheme Based on Sparse Polynomials

36. On the security of subspace subcodes of Reed-Solomon codes for public key encryption

37. Towards advance encryption based on a Generalized Suzuki 2-groups

38. Generalized Matsui Algorithm 1 with Application for the Full DES

39. Quantum key recovery attack on SIMON32/64

40. A Key Recovery Reaction Attack on QC-MDPC

41. Unbalanced biclique cryptanalysis of a full round Midori

42. Revisiting the Security of Qian et al.’s Revised Tree-$$\hbox {LSHB}^+$$ Protocol

43. MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC

44. Related-Key Differential Cryptanalysis of the Reduced-Round Block Cipher GIFT

46. Improved Meet-in-the-Middle Attacks on Generic Feistel Constructions

47. Optimizing Fast Near Collision Attack on Grain Using Linear Programming

48. Improved encryption scheme based on the automorphism group of the Ree function field

49. Applications of Simon’s algorithm in quantum attacks on Feistel variants

50. Hybrid Encryption Algorithm for the Data Security of ESP32 based IoT-enabled Robots

Catalog

Books, media, physical & digital resources