Search results
From MaRDI portal
- signature variants 2022-03-31 Paper The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes 2021-12-08...10 bytes (16 words) - 14:19, 7 December 2023
- Differential fault attack on SIMON with very few faults 2019-03-29 Paper A TMDTO Attack Against Lizard 2018-09-14 Paper A Differential Fault Attack on Plantlet...10 bytes (18 words) - 20:03, 13 December 2023
- Side-Channel Cube Attack Revisited 2016-04-13 Paper Another Tradeoff Attack on Sprout-Like Stream Ciphers 2016-03-23 Paper Fast Correlation Attacks over Extension...10 bytes (17 words) - 13:34, 11 December 2023
- 2014-08-07 Paper Polynomial Time Attack on Wild McEliece over Quadratic Extensions 2014-05-27 Paper An Efficient Attack of a McEliece Cryptosystem Variant...10 bytes (18 words) - 02:00, 10 December 2023
- Correlation Attack on the Shrinking and Self-shrinking Generators 2014-08-21 Paper A Weak Key Class of XTEA for a Related-Key Rectangle Attack 2014-08-21...10 bytes (16 words) - 22:41, 10 December 2023
- Publication Date of Publication Type Attack on Kayawood protocol: uncloaking private keys 2021-06-17 Paper Punctual dimension of algebraic structures in...10 bytes (16 words) - 18:02, 11 December 2023
- 2016-02-19 Paper Power analysis attack: an approach based on machine learning 2015-01-14 Paper A Time Series Approach for Profiling Attack 2014-09-15 Paper A dynamic...10 bytes (16 words) - 07:19, 9 December 2023
- correlation attack on elliptic curves 2015-11-18 Paper Horizontal Collision Correlation Attack on Elliptic Curves 2015-10-01 Paper Side-Channel Attack against...10 bytes (16 words) - 04:16, 13 December 2023
- networks 2020-11-30 Paper Semantics for Specialising Attack Trees based on Linear Logic 2018-01-05 Paper Attack-defense trees 2014-04-01 Paper Privacy and verifiability...10 bytes (17 words) - 18:36, 11 December 2023
- de/entity/Q2855575 2013-10-25 Paper A Differential Fault Attack on MICKEY 2.0 2013-10-10 Paper A Chosen IV Related Key Attack on Grain-128a 2013-06-28 Paper New Results...10 bytes (16 words) - 03:33, 10 December 2023
- DEFENSE AGAINST MULTIPLE ATTACK FACILITIES 2011-10-11 Paper Protecting complex infrastructures against multiple strategic attackers 2011-03-16 Paper A closure...10 bytes (16 words) - 14:24, 10 December 2023
- of Grain 2009-04-02 Paper New State Recovery Attack on RC4 2009-02-10 Paper A Linear Distinguishing Attack on Scream 2008-12-21 Paper On Large Distributions...10 bytes (17 words) - 17:46, 13 December 2023
- flow-jamming attack 2018-07-11 Paper Methods for removing links in a network to minimize the spread of infections 2016-11-17 Paper Interdicting attack graphs...10 bytes (18 words) - 11:32, 11 December 2023
- Meet-in-the-Middle Attack on 11-Round 3D Block Cipher 2017-04-26 Paper https://portal.mardi4nfdi.de/entity/Q2993213 2016-08-10 Paper Meet-in-the-middle attacks on 10-round...10 bytes (17 words) - 14:29, 11 December 2023
- Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher 2014-08-20 Paper The higher-order meet-in-the-middle attack and its application...10 bytes (16 words) - 02:22, 11 December 2023
- 2017-08-25 Paper DAG-based attack and defense modeling: don't miss the forest for the attack trees 2014-11-24 Paper Attack-defense trees 2014-04-01 Paper...10 bytes (16 words) - 20:24, 6 October 2023
- Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE 2023-06-30 Paper Recovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABER...10 bytes (17 words) - 08:06, 12 December 2023
- under the threat of jamming attacks 2019-03-27 Paper An attacker‐defender model for analyzing the vulnerability of initial attack in wildfire suppression 2018-09-04...10 bytes (18 words) - 11:32, 11 December 2023
- Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher 2014-08-20 Paper The higher-order meet-in-the-middle attack and its application...10 bytes (16 words) - 15:23, 11 December 2023
- Paper https://portal.mardi4nfdi.de/entity/Q4929337 2010-09-22 Paper A simple attack on some clock-controlled generators 2010-06-28 Paper Theoretical Computer...10 bytes (18 words) - 16:05, 6 December 2023