scientific article; zbMATH DE number 4187707
From MaRDI portal
Recommendations
Cited in
(15)- A constraint-based approach to enigma 1225
- Probability method for cryptanalysis of general multivariate modular linear equation
- scientific article; zbMATH DE number 5927451 (Why is no real title available?)
- Discrete optimisation and fast correlation attacks
- Cryptanalysis of an E0-like combiner with memory
- scientific article; zbMATH DE number 2036177 (Why is no real title available?)
- Using tools from error correcting theory in linear cryptanalysis
- A distinguisher for RNGs with LFSR post-processing
- The piling-up approximation in linear cryptanalysis
- scientific article; zbMATH DE number 1583934 (Why is no real title available?)
- scientific article; zbMATH DE number 1504673 (Why is no real title available?)
- Synthetic Linear Analysis: Improved Attacks on CubeHash and Rabbit
- scientific article; zbMATH DE number 1455103 (Why is no real title available?)
- Linearization Attacks Against Syndrome Based Hashes
- Computation of low-weight parity checks for correlation attacks on stream ciphers
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5752489)