Counter-Cryptanalysis
From MaRDI portal
Publication:2845665
DOI10.1007/978-3-642-40041-4_8zbMATH Open1310.94170OpenAlexW4248846263MaRDI QIDQ2845665FDOQ2845665
Authors: Marc Stevens
Publication date: 2 September 2013
Published in: Advances in Cryptology – CRYPTO 2013 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-40041-4_8
Recommendations
- Public-key cryptanalysis
- scientific article; zbMATH DE number 2089131
- Cryptanalysis of Ciminion
- Cryptanalysis of C2
- scientific article; zbMATH DE number 1024102
- Cryptanalysis of multiple modes of operation
- Attacking block ciphers
- Cryptanalysis of a homomorphic encryption scheme
- Cryptanalysis of CTC2
Cited In (7)
- Title not available (Why is that?)
- Collapseability of tree hashes
- Practical free-start collision attacks on 76-step SHA-1
- Title not available (Why is that?)
- Cryptographic defense against traffic analysis
- Improved collision detection of MD5 with additional sufficient conditions
- Reverse-engineering of the cryptanalytic attack used in the flame super-malware
This page was built for publication: Counter-Cryptanalysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2845665)