Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • signature variants 2022-03-31 Paper The nested subset differential attack. A practical direct attack against LUOV which forges a signature within 210 minutes 2021-12-08...
    10 bytes (16 words) - 14:19, 7 December 2023
  • Differential fault attack on SIMON with very few faults 2019-03-29 Paper A TMDTO Attack Against Lizard 2018-09-14 Paper A Differential Fault Attack on Plantlet...
    10 bytes (18 words) - 20:03, 13 December 2023
  • Side-Channel Cube Attack Revisited 2016-04-13 Paper Another Tradeoff Attack on Sprout-Like Stream Ciphers 2016-03-23 Paper Fast Correlation Attacks over Extension...
    10 bytes (17 words) - 13:34, 11 December 2023
  • 2014-08-07 Paper Polynomial Time Attack on Wild McEliece over Quadratic Extensions 2014-05-27 Paper An Efficient Attack of a McEliece Cryptosystem Variant...
    10 bytes (18 words) - 02:00, 10 December 2023
  • Correlation Attack on the Shrinking and Self-shrinking Generators 2014-08-21 Paper A Weak Key Class of XTEA for a Related-Key Rectangle Attack 2014-08-21...
    10 bytes (16 words) - 22:41, 10 December 2023
  • Publication Date of Publication Type Attack on Kayawood protocol: uncloaking private keys 2021-06-17 Paper Punctual dimension of algebraic structures in...
    10 bytes (16 words) - 18:02, 11 December 2023
  • 2016-02-19 Paper Power analysis attack: an approach based on machine learning 2015-01-14 Paper A Time Series Approach for Profiling Attack 2014-09-15 Paper A dynamic...
    10 bytes (16 words) - 07:19, 9 December 2023
  • correlation attack on elliptic curves 2015-11-18 Paper Horizontal Collision Correlation Attack on Elliptic Curves 2015-10-01 Paper Side-Channel Attack against...
    10 bytes (16 words) - 04:16, 13 December 2023
  • networks 2020-11-30 Paper Semantics for Specialising Attack Trees based on Linear Logic 2018-01-05 Paper Attack-defense trees 2014-04-01 Paper Privacy and verifiability...
    10 bytes (17 words) - 18:36, 11 December 2023
  • de/entity/Q2855575 2013-10-25 Paper A Differential Fault Attack on MICKEY 2.0 2013-10-10 Paper A Chosen IV Related Key Attack on Grain-128a 2013-06-28 Paper New Results...
    10 bytes (16 words) - 03:33, 10 December 2023
  • DEFENSE AGAINST MULTIPLE ATTACK FACILITIES 2011-10-11 Paper Protecting complex infrastructures against multiple strategic attackers 2011-03-16 Paper A closure...
    10 bytes (16 words) - 14:24, 10 December 2023
  • of Grain 2009-04-02 Paper New State Recovery Attack on RC4 2009-02-10 Paper A Linear Distinguishing Attack on Scream 2008-12-21 Paper On Large Distributions...
    10 bytes (17 words) - 17:46, 13 December 2023
  • flow-jamming attack 2018-07-11 Paper Methods for removing links in a network to minimize the spread of infections 2016-11-17 Paper Interdicting attack graphs...
    10 bytes (18 words) - 11:32, 11 December 2023
  • Meet-in-the-Middle Attack on 11-Round 3D Block Cipher 2017-04-26 Paper https://portal.mardi4nfdi.de/entity/Q2993213 2016-08-10 Paper Meet-in-the-middle attacks on 10-round...
    10 bytes (17 words) - 14:29, 11 December 2023
  • Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher 2014-08-20 Paper The higher-order meet-in-the-middle attack and its application...
    10 bytes (16 words) - 02:22, 11 December 2023
  • 2017-08-25 Paper DAG-based attack and defense modeling: don't miss the forest for the attack trees 2014-11-24 Paper Attack-defense trees 2014-04-01 Paper...
    10 bytes (16 words) - 20:24, 6 October 2023
  • Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE 2023-06-30 Paper Recovery attack on Bob's reused randomness in CRYSTALS-KYBER and SABER...
    10 bytes (17 words) - 08:06, 12 December 2023
  • under the threat of jamming attacks 2019-03-27 Paper An attacker‐defender model for analyzing the vulnerability of initial attack in wildfire suppression 2018-09-04...
    10 bytes (18 words) - 11:32, 11 December 2023
  • Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher 2014-08-20 Paper The higher-order meet-in-the-middle attack and its application...
    10 bytes (16 words) - 15:23, 11 December 2023
  • Paper https://portal.mardi4nfdi.de/entity/Q4929337 2010-09-22 Paper A simple attack on some clock-controlled generators 2010-06-28 Paper Theoretical Computer...
    10 bytes (18 words) - 16:05, 6 December 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)