×

Found 16 Documents (Results 1–16)

Cryptanalysis of MORUS. (English) Zbl 1446.94095

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11273, 35-64 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Analyzing permutations for AES-like ciphers: understanding shiftrows. (English) Zbl 1382.94060

Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 37-58 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linear distinguishers in the key-less setting: application to PRESENT. (English) Zbl 1367.94323

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 217-240 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Security of the AES with a secret S-box. (English) Zbl 1367.94352

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 175-189 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Comb to pipeline: fast software encryption revisited. (English) Zbl 1367.94303

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 150-171 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Key recovery attacks on recent authenticated ciphers. (English) Zbl 1370.94490

Aranha, F. (ed.) et al., Progress in cryptology – LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17–19, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). Lecture Notes in Computer Science 8895, 274-287 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Finding cores of limited length. (English) Zbl 1517.68270

Dehne, Frank (ed.) et al., Algorithms and data structures. 5th international workshop, WADS ’97, Halifax, Nova Scotia, Canada, August 6–8, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1272, 45-54 (1997).
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software