Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Worst-case stealthy innovation-based linear attack on remote state estimation 2018-06-14 Paper Optimal Linear Cyber-Attack on Remote State Estimation 2017-09-21...
    10 bytes (16 words) - 12:44, 24 September 2023
  • Publication Date of Publication Type Rotational-linear attack: a new framework of cryptanalysis on ARX ciphers with applications to Chaskey 2022-06-08...
    10 bytes (16 words) - 18:30, 6 October 2023
  • Publication Date of Publication Type Improved differential-linear attack with application to round-reduced Speck32/64 2022-11-09 Paper...
    10 bytes (16 words) - 23:36, 24 September 2023
  • Publication Date of Publication Type Optimal linear attack for multi-sensor network against state estimation 2022-11-09 Paper https://portal.mardi4nfdi...
    10 bytes (16 words) - 23:41, 24 September 2023
  • Template Attacks 2009-12-15 Paper A multidimensional linear distinguishing attack on the Shannon cipher 2009-05-12 Paper Linear Distinguishing Attack on Shannon...
    10 bytes (18 words) - 10:55, 7 October 2023
  • Publication Type A general framework for the related-key linear attack against block ciphers with linear key schedules 2020-07-21 Paper Format-Preserving Encryption...
    10 bytes (17 words) - 10:27, 6 October 2023
  • Complexity in Multidimensional Linear Attack 2015-12-10 Paper What is the effective key length for a block cipher: an attack on every practical block cipher...
    10 bytes (17 words) - 20:52, 12 December 2023
  • Paper Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques 2018-05-09 Paper Statistical integral attack on CAST-256 and...
    10 bytes (16 words) - 17:43, 6 October 2023
  • Paper A Differential-Linear Attack on 12-Round Serpent 2009-01-22 Paper Collisions for RC4-Hash 2008-11-20 Paper A Practical Attack on KeeLoq 2008-04-15...
    10 bytes (16 words) - 08:53, 6 October 2023
  • Publication Type A general framework for the related-key linear attack against block ciphers with linear key schedules 2020-07-21 Paper Revised version of block...
    10 bytes (16 words) - 10:16, 6 October 2023
  • RRP-based networked systems under DoS attacks with power interval 2022-09-30 Paper Optimal Stealthy Linear-Attack Schedules on Remote State Estimation 2022-09-23...
    10 bytes (16 words) - 09:10, 7 October 2023
  • State Recovery Attack on RC4 2009-02-10 Paper A Linear Distinguishing Attack on Scream 2008-12-21 Paper On Large Distributions for Linear Cryptanalysis...
    10 bytes (17 words) - 17:46, 13 December 2023
  • 2023-10-12 Paper A general framework for the related-key linear attack against block ciphers with linear key schedules 2020-07-21 Paper Revised version of block...
    10 bytes (18 words) - 03:08, 7 October 2023
  • bijective S-boxes with linear structures 2023-07-03 Paper Affine linear cryptanalysis 2019-05-15 Paper Multidimensional linear cryptanalysis 2019-01-29...
    10 bytes (17 words) - 14:16, 24 September 2023
  • spectrum estimation: an \(H_\infty\) perspective 2023-06-30 Paper Optimal linear attack for multi-sensor network against state estimation 2022-11-09 Paper System...
    10 bytes (16 words) - 17:24, 24 September 2023
  • Improved differential-linear attack with application to round-reduced Speck32/64 2022-11-09 Paper Fast chosen-key distinguish attacks on round-reduced AES-192...
    10 bytes (16 words) - 18:56, 24 September 2023
  • spend attack for network with non-zero time delay 2023-03-30 Paper Security of the Poseidon hash function against non-binary differential and linear attacks...
    10 bytes (16 words) - 02:59, 10 December 2023
  • Paper Improving key-recovery in linear attacks: application to 28-round PRESENT 2021-12-01 Paper Internal symmetries and linear properties: full-permutation...
    10 bytes (18 words) - 00:04, 25 September 2023
  • Publication Date of Publication Type Linear regression attack with F-test: a new SCARE technique for secret block ciphers 2018-10-26 Paper My Traces Learn...
    10 bytes (16 words) - 20:53, 24 September 2023
  • Paper Key guessing strategies for linear key-schedule algorithms in rectangle attacks 2022-08-30 Paper Linear Hull Attack on Round-Reduced Simeck with Dynamic...
    10 bytes (16 words) - 12:55, 6 October 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)