Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • dual-signature protocol with better performance in resisting existential forgery attack 2019-05-03 Paper A new \(n\)-party quantum secret sharing model based...
    10 bytes (17 words) - 00:33, 10 December 2023
  • Generation Based on POS-BP Neural Network 2020-08-26 Paper Universal forgery attack against GCM-RUP 2020-08-05 Paper Size-dependent electromechanical coupling...
    10 bytes (17 words) - 19:57, 12 December 2023
  • dual-signature protocol with better performance in resisting existential forgery attack 2019-05-03 Paper Security analysis with improved design of post-confirmation...
    10 bytes (17 words) - 17:33, 13 December 2023
  • cryptanalysis of reduced-round \textsc{SKINNY} 2021-11-25 Paper A practical forgery attack on Lilliput-AE 2020-06-15 Paper How to build pseudorandom functions...
    10 bytes (16 words) - 01:15, 25 September 2023
  • Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets 2014-07-24 Paper Leaked-State-Forgery Attack against the Authenticated...
    10 bytes (16 words) - 11:01, 7 October 2023
  • 2013-10-10 Paper Zero-Distortion Authentication Watermarking 2010-02-09 Paper Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme 2009-03-06 Paper...
    10 bytes (16 words) - 13:01, 7 October 2023
  • dual-signature protocol with better performance in resisting existential forgery attack 2019-05-03 Paper Security analysis with improved design of post-confirmation...
    10 bytes (18 words) - 09:17, 24 September 2023
  • dual-signature protocol with better performance in resisting existential forgery attack 2019-05-03 Paper 3-Uniform states and orthogonal arrays of strength...
    10 bytes (17 words) - 13:02, 11 December 2023
  • Publication Date of Publication Type Analysis of forgery attack on one-time proxy signature and the improvement 2016-04-01 Paper https://portal.mardi4nfdi...
    10 bytes (17 words) - 17:02, 24 September 2023
  • 2022-08-30 Paper Improved cube-attack-like cryptanalysis of reduced-round Ketje-Jr and Keccak-MAC 2021-06-16 Paper Universal forgery attack against GCM-RUP 2020-08-05...
    10 bytes (17 words) - 11:20, 7 October 2023
  • security for permutation-based Feistel networks 2021-03-17 Paper Universal forgery attack against GCM-RUP 2020-08-05 Paper Modeling the importation and local...
    10 bytes (16 words) - 20:08, 6 October 2023
  • Publication Type On weak keys and forgery attacks against polynomial-based MAC schemes 2016-01-11 Paper On Weak Keys and Forgery Attacks Against Polynomial-Based...
    10 bytes (16 words) - 18:07, 6 October 2023
  • Paper Efficient quantum dialogue using single photons 2015-01-23 Paper Forgery attack on one-time proxy signature and the improvement 2014-12-12 Paper Dynamics...
    10 bytes (17 words) - 01:50, 10 December 2023
  • Paper Universal forgery attack against GCM-RUP 2020-08-05 Paper Generic attacks on hash combiners 2020-06-15 Paper Low-memory attacks against two-round...
    10 bytes (16 words) - 11:20, 7 October 2023
  • Publication Type Quantum meet-in-the-middle attack on Feistel construction 2023-05-23 Paper Quantum forgery attacks on COPA, AES-COPA and marble authenticated...
    10 bytes (16 words) - 03:06, 25 September 2023
  • 2015-09-18 Paper Leaked-State-Forgery Attack against the Authenticated Encryption Algorithm ALE 2013-12-10 Paper Differential Attacks against Stream Cipher ZUC...
    10 bytes (17 words) - 20:35, 24 September 2023
  • symmetrically-private information retrieval 2016-11-02 Paper Analysis of forgery attack on one-time proxy signature and the improvement 2016-04-01 Paper Security...
    10 bytes (17 words) - 17:02, 24 September 2023
  • \textsc{Frit} 2020-07-21 Paper Forgery attacks on FlexAE and FlexAEAD 2020-05-06 Paper Statistical ineffective fault attacks on masked AES with fault countermeasures...
    10 bytes (16 words) - 10:27, 6 October 2023
  • GHZ state 2015-01-23 Paper Forgery attack on one-time proxy signature and the improvement 2014-12-12 Paper Trojan horse attack free fault-tolerant quantum...
    10 bytes (17 words) - 11:28, 7 October 2023
  • revocation in sovrin: performance through distributed trust 2021-12-20 Paper Forgery attacks on FlexAE and FlexAEAD 2020-05-06 Paper Linear equivalence of block...
    10 bytes (16 words) - 12:50, 6 October 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)