Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • quantum setting 2022-03-22 Paper Ubiquitous weak-key classes of BRW-polynomial function 2018-07-17 Paper Related-Key Almost Universal Hash Functions: Definitions...
    10 bytes (17 words) - 13:34, 11 December 2023
  • Particles on a Toric Grid 2014-01-21 Paper Secure Authentication from a Weak Key, without Leaking Information 2011-05-27 Paper Sampling in a Quantum Population...
    10 bytes (18 words) - 01:28, 12 December 2023
  • Publication Date of Publication Type Weak-Key Class of MISTY1 for Related-Key Differential Attack 2013-01-07 Paper...
    10 bytes (18 words) - 23:36, 27 December 2023
  • Publication Type Shared authentication token secure against replay and weak key attacks 2016-05-26 Paper...
    10 bytes (18 words) - 11:32, 7 October 2023
  • Publication Date of Publication Type A weak key test for braid based cryptography. 2006-05-29 Paper...
    10 bytes (16 words) - 12:44, 7 October 2023
  • Publication Date of Publication Type Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures...
    10 bytes (16 words) - 00:19, 25 September 2023
  • Publication Date of Publication Type Ubiquitous weak-key classes of BRW-polynomial function 2018-07-17 Paper Related-Key Almost Universal Hash Functions: Definitions...
    10 bytes (16 words) - 19:28, 24 September 2023
  • Publication Type Subverting deniability 2023-07-21 Paper Partition oracles from weak key forgeries 2022-06-29 Paper Subverting decryption in AEAD 2020-05-06 Paper...
    10 bytes (16 words) - 00:25, 25 September 2023
  • Publication Type A Weak Key Class of XTEA for a Related-Key Rectangle Attack 2014-08-21 Paper Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks...
    10 bytes (16 words) - 11:52, 6 October 2023
  • Encryption Schemes for Wireless Sensor Networks 2015-12-02 Paper Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes 2015-10-20...
    10 bytes (16 words) - 10:02, 6 October 2023
  • cryptanalysis of QUARK 2018-10-24 Paper Correlation cube attacks: from weak-key distinguisher to key recovery 2018-07-09 Paper https://portal.mardi4nfdi.de/entity/Q4539291...
    10 bytes (16 words) - 18:37, 24 September 2023
  • application in reliability-based optimization 2022-12-21 Paper Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations...
    10 bytes (16 words) - 01:26, 9 December 2023
  • slide attack on the full GOST block cipher 2014-04-11 Paper Weak-Key Class of MISTY1 for Related-Key Differential Attack 2013-01-07 Paper...
    10 bytes (16 words) - 17:28, 24 September 2023
  • Paper Autocorrelations of vectorial Boolean functions 2022-06-15 Paper Weak-key distinguishers for AES 2022-03-25 Paper PRINCEv2. More security for (almost)...
    10 bytes (16 words) - 12:52, 6 October 2023
  • Publication Type Shared authentication token secure against replay and weak key attacks 2016-05-26 Paper Amplifying Side-Channel Attacks with Techniques...
    10 bytes (18 words) - 15:23, 10 December 2023
  • Comment on ``Quantum signature scheme with weak arbitrator 2014-09-30 Paper A Weak Key Class of XTEA for a Related-Key Rectangle Attack 2014-08-21 Paper https://portal...
    10 bytes (17 words) - 16:06, 10 December 2023
  • Publication Date of Publication Type Weak-key distinguishers for AES 2022-03-25 Paper Differential Attacks on Lightweight Block Ciphers PRESENT, PRIDE...
    10 bytes (16 words) - 12:52, 6 October 2023
  • cryptanalysis of QUARK 2018-10-24 Paper Correlation cube attacks: from weak-key distinguisher to key recovery 2018-07-09 Paper Comments on ``A design of Boolean functions...
    10 bytes (16 words) - 18:37, 24 September 2023
  • Shrinking and Self-shrinking Generators 2014-08-21 Paper A Weak Key Class of XTEA for a Related-Key Rectangle Attack 2014-08-21 Paper Formulas for cube roots...
    10 bytes (16 words) - 22:41, 10 December 2023
  • networks with discontinuous activations 2021-11-08 Paper Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations...
    10 bytes (17 words) - 15:23, 12 December 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)