×

Found 2 Documents (Results 1–2)

On selection of samples in algebraic attacks and a new technique to find hidden low degree equations. (English) Zbl 1318.94081

Susilo, Willy (ed.) et al., Information security and privacy. 19th Australasian conference, ACISP 2014, Wollongong, NSW, Australia, July 7–9, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-08343-8/pbk). Lecture Notes in Computer Science 8544, 50-65 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Algebraic, AIDA/Cube and side channel analysis of KATAN family of block ciphers. (English) Zbl 1266.94020

Gong, Guang (ed.) et al., Progress in cryptology – INDOCRYPT 2010. 11th international conference on cryptology in India, Hyderabad, India, December 12–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17400-1/pbk). Lecture Notes in Computer Science 6498, 176-196 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Filter Results by …

Year of Publication

Main Field

Software