×

Found 210 Documents (Results 1–100)

Coefficient grouping for complex affine layers. (English) Zbl 07799267

Handschuh, Helena (ed.) et al., Advances in cryptology – CRYPTO 2023. 43rd annual international cryptology conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 14083, 540-572 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Coefficient grouping: breaking Chaghri and more. (English) Zbl 07774123

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14007, 287-317 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP. (English) Zbl 1528.94068

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 14007, 189-219 (2023).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Algebraic meet-in-the-middle attack on LowMC. (English) Zbl 1519.94161

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13791, 225-255 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A Mortar Finite Element Formulation for Large Deformation Lubricated Contact Problems with Smooth Transition Between Mixed, Elasto-Hydrodynamic and Full Hydrodynamic Lubrication. arXiv:2201.01095

Preprint, arXiv:2201.01095 [cs.CE] (2022).
BibTeX Cite
Full Text: arXiv

Algebraic attacks on Rasta and Dasta using low-degree equations. (English) Zbl 1514.94115

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13090, 214-240 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Grain-128AEADv2: strengthening the initialization against key reconstruction. (English) Zbl 1493.94035

Conti, Mauro (ed.) et al., Cryptology and network security. 20th international conference, CANS 2021, Vienna, Austria, December 13–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13099, 24-41 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of full LowMC and LowMC-M with algebraic techniques. (English) Zbl 1487.94130

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 368-401 (2021).
MSC:  94A60 11T71
PDFBibTeX XMLCite
Full Text: DOI

An optimal decentralized \((\Delta+1)\)-coloring algorithm. (English) Zbl 07651156

Grandoni, Fabrizio (ed.) et al., 28th annual European symposium on algorithms. ESA 2020, September 7–9, 2020, Pisa, Italy, virtual conference. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 173, Article 17, 12 p. (2020).
MSC:  68Wxx
PDFBibTeX XMLCite
Full Text: DOI arXiv

Automatic verification of differential characteristics: application to reduced Gimli. (English) Zbl 1499.94045

Micciancio, Daniele (ed.) et al., Advances in cryptology – CRYPTO 2020. 40th annual international cryptology conference, CRYPTO 2020, Santa Barbara, CA, USA, August 17–21, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12172, 219-248 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD. (English) Zbl 1479.94187

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12105, 466-495 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the data limitation of small-state stream ciphers: correlation attacks on Fruit-80 and Plantlet. (English) Zbl 1453.94120

Paterson, Kenneth G. (ed.) et al., Selected areas in cryptography – SAC 2019. 26th international conference, Waterloo, ON, Canada, August 12–16, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11959, 365-392 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved related-tweakey rectangle attacks on reduced-round Deoxys-BC-384 and Deoxys-I-256-128. (English) Zbl 1456.94123

Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11898, 139-159 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of ForkAES. (English) Zbl 1458.94212

Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11464, 43-63 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An AEAD variant of the Grain stream cipher. (English) Zbl 1432.94136

Carlet, Claude (ed.) et al., Codes, cryptology and information security. Third international conference, C2SI 2019, Rabat, Morocco, April 22–24, 2019. Proceedings – in honor of Said el Hajji. Cham: Springer. Lect. Notes Comput. Sci. 11445, 55-71 (2019).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A key-recovery attack on 855-round Trivium. (English) Zbl 1436.94066

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10992, 160-184 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fast correlation attack revisited – cryptanalysis on full Grain-128a, Grain-128, and Grain-v1. (English) Zbl 1436.94096

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10992, 129-159 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved division property based cube attacks exploiting algebraic properties of superpoly. (English) Zbl 1444.94103

Shacham, Hovav (ed.) et al., Advances in cryptology – CRYPTO 2018. 38th annual international cryptology conference, Santa Barbara, CA, USA, August 19–23, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10991, 275-305 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Fast near collision attack on the Grain v1 stream cipher. (English) Zbl 1428.94099

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10821, 771-802 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cube attacks on non-blackbox polynomials based on division property. (English) Zbl 1406.94081

Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part III. Cham: Springer (ISBN 978-3-319-63696-2/pbk; 978-3-319-63697-9/ebook). Lecture Notes in Computer Science 10403, 250-279 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Optimized interpolation attacks on lowMC. (English) Zbl 1382.94092

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 535-560 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fast correlation attacks over extension fields, large-unit linear approximation and cryptanalysis of SNOW 2.0. (English) Zbl 1375.94163

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 643-662 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA. (English) Zbl 1382.94117

Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3–5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 350-369 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Progress in cryptology – INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14–17, 2014. Proceedings. (English) Zbl 1319.94007

Lecture Notes in Computer Science 8885. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). xxvi, 444 p. (2014).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Atom and archetype: the Pauli/Jung letters, 1932–1958. Edited by C. A. Meier with the assistance of C. P. Enz and M. Fierz. Transl. from the German by David Roscoe. With a preface by Beverley Zabriskie. (English) Zbl 1300.81003

Princeton, NJ: Princeton University Press (ISBN 978-0-691-16147-1/pbk). lx, 250 p. (2014).
PDFBibTeX XMLCite

Differential biases in reduced-round Keccak. (English) Zbl 1288.94056

Pointcheval, David (ed.) et al., Progress in cryptology – AFRICACRYPT 2014. 7th international conference on cryptology in Africa, Marrakesh, Morocco, May 28–30, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06733-9/pbk). Lecture Notes in Computer Science 8469, 69-87 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New results on generalization of Roos-type biases and related keystreams of RC4. (English) Zbl 1312.94076

Youssef, Amr (ed.) et al., Progress in cryptology – AFRICACRYPT 2013. 6th international conference on cryptology in Africa, Cairo, Egypt, June 22–24, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38552-0/pbk). Lecture Notes in Computer Science 7918, 222-239 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The complexity of monotone hybrid logics over linear frames and the natural numbers. (English) Zbl 1291.03032

Bolander, Thomas (ed.) et al., Advances in modal logic. Vol. 9. Proceedings of the 9th conference (AiML 2012), Copenhagen, Denmark, August 22–25, 2012. London: College Publications (ISBN 978-1-84890-068-4/pbk). 261-278 (2012).
MSC:  03B45 68Q17
PDFBibTeX XMLCite
Full Text: arXiv

Synthetic linear analysis: improved attacks on CubeHash and Rabbit. (English) Zbl 1369.94553

Kim, Howon (ed.), Information security and cryptology – ICISC 2011. 14th international conference, Seoul, Korea, November 30–December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 248-260 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Stream ciphers, a perspective. (Abstract). (English) Zbl 1291.94128

Mitrokotsa, Aikaterini (ed.) et al., Progress in cryptology – AFRICACRYPT 2012. 5th international conference on cryptology in Africa, Ifrane, Morocco, July 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31409-4/pbk). Lecture Notes in Computer Science 7374, 412 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Conditional differential cryptanalysis of trivium and KATAN. (English) Zbl 1292.94095

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 200-212 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Practical analysis of reduced-round Keccak. (English) Zbl 1291.94136

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 236-254 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of the knapsack generator. (English) Zbl 1282.94050

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 188-198 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Conditional differential cryptanalysis of NLFSR-based cryptosystems. (English) Zbl 1253.94056

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 130-145 (2010).
MSC:  94A60 94A55
PDFBibTeX XMLCite
Full Text: DOI

Quark: a lightweight hash. (English) Zbl 1297.94043

Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 1-15 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Differential and invertibility properties of BLAKE. (English) Zbl 1279.94052

Hong, Seokhie (ed.) et al., Fast software encryption. 17th international workshop, FSE 2010, Seoul, Korea, February 7–10, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-13857-7/pbk). Lecture Notes in Computer Science 6147, 318-332 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of ESSENCE. (English) Zbl 1279.94106

Hong, Seokhie (ed.) et al., Fast software encryption. 17th international workshop, FSE 2010, Seoul, Korea, February 7–10, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-13857-7/pbk). Lecture Notes in Computer Science 6147, 134-152 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Improved linear differential attacks on CubeHash. (English) Zbl 1284.94083

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3–6, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-12677-2/pbk). Lecture Notes in Computer Science 6055, 407-418 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Which soft constraints do you prefer? (English) Zbl 1347.68197

Roşu, Grigore (ed.), Proceedings of the 7th international workshop on rewriting logic and its applications (WRLA 2008), Budapest, Hungary, March 29–30, 2008. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 238, No. 3, 189-205 (2009).
MSC:  68Q42 68T20
PDFBibTeX XMLCite
Full Text: DOI

Linearization framework for collision attacks: application to CubeHash and MD6. (English) Zbl 1267.94044

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 560-577 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved cryptanalysis of Skein. (English) Zbl 1267.94034

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 542-559 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Preimage attacks on 3-pass HAVAL and step-reduced MD5. (English) Zbl 1256.94041

Avanzi, Roberto Maria (ed.) et al., Selected areas in cryptography. 15th international workshop, SAC 2008, Sackville, New Brunswick, Canada, August 14–15. Revised selected papers. Berlin: Springer (ISBN 978-3-642-04158-7/pbk). Lecture Notes in Computer Science 5381, 120-135 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The complexity of satisfiability for fragments of hybrid logic. I. (English) Zbl 1250.03036

Královič, Rastislav (ed.) et al., Mathematical foundations of computer science 2009. 34th international symposium, MFCS 2009, Novy Smokovec, High Tatras, Slovakia, August 24–28, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03815-0/pbk). Lecture Notes in Computer Science 5734, 587-599 (2009).
MSC:  03B45 03B25 68Q25
PDFBibTeX XMLCite
Full Text: DOI

Cube testers and key recovery attacks on reduced-round MD6 and Trivium. (English) Zbl 1291.94051

Dunkelman, Orr (ed.), Fast software encryption. 16th international workshop, FSE 2009, Leuven, Belgium, February 22–25, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-03316-2/pbk). Lecture Notes in Computer Science 5665, 1-22 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Inside the hypercube. (English) Zbl 1307.94035

Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 202-213 (2009).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

New directions in cryptanalysis of self-synchronizing stream ciphers. (English) Zbl 1203.94107

Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 15-26 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New features of Latin dances: analysis of Salsa, ChaCha, and Rumba. (English) Zbl 1154.68378

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 470-488 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The hash function family LAKE. (English) Zbl 1154.68379

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 36-53 (2008).
MSC:  68P25 68N99 94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

Database

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software