×

Found 94 Documents (Results 1–94)

Monte Carlo tree search for automatic differential characteristics search: application to SPECK. (English) Zbl 1519.94048

Isobe, Takanori (ed.) et al., Progress in cryptology – INDOCRYPT 2022. 23rd international conference on cryptology in India, Kolkata, India, December 11–14, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13774, 373-397 (2023).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Implementing Grover oracle for lightweight block ciphers under depth constraints. (English) Zbl 07719194

Nguyen, Khoa (ed.) et al., Information security and privacy. 27th Australasian conference, ACISP 2022, Wollongong, NSW, Australia, November 28–30, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13494, 85-105 (2022).
PDFBibTeX XMLCite
Full Text: DOI

Block-cipher-based tree hashing. (English) Zbl 07708475

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13510, 205-233 (2022).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Exploring lightweight S-boxes using cellular automata and reinforcement learning. (English) Zbl 1520.94036

Chopard, Bastien (ed.) et al., Cellular automata. 15th international conference on cellular automata for research and industry, ACRI 2022, Geneva, Switzerland, September 12–15, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13402, 17-28 (2022).
MSC:  94A60 68Q80 68T05
PDFBibTeX XMLCite
Full Text: DOI

The design of Rijndael. The Advanced Encryption Standard (AES). 2nd revised and updated edition. (English) Zbl 1437.94001

Information Security and Cryptography. Berlin: Springer (ISBN 978-3-662-60768-8/hbk; 978-3-662-60769-5/ebook). xviii, 282 p. (2020).
PDFBibTeX XMLCite
Full Text: DOI

The mathematics of encryption. An elementary introduction. (English) Zbl 1284.94001

Mathematical World 29. Providence, RI: American Mathematical Society (AMS) (ISBN 978-0-8218-8321-1/pbk; 978-1-4704-1594-5/ebook). xvii, 332 p. (2013).
PDFBibTeX XMLCite
Full Text: DOI

The mix-and-cut shuffle: small-domain encryption secure against \(N\) queries. (English) Zbl 1310.94167

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 392-409 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Highly accurate key extraction method for access-driven cache attacks using correlation coefficient. (English) Zbl 1316.94089

Boyd, Colin (ed.) et al., Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1–3, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). Lecture Notes in Computer Science 7959, 286-301 (2013).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

ElimLin algorithm revisited. (English) Zbl 1282.94039

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 306-325 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

GPU-acceleration of block ciphers in the OpenSSL cryptographic library. (English) Zbl 1306.94055

Gollmann, Dieter (ed.) et al., Information security. 15th international conference, ISC 2012, Passau, Germany, September 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33382-8/pbk). Lecture Notes in Computer Science 7483, 338-353 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Fault analysis of the KATAN family of block ciphers. (English) Zbl 1291.94038

Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 319-336 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Self-similarity attacks on block ciphers and application to KeeLoq. (English) Zbl 1285.94051

Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 55-66 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Random permutation statistics and an improved slide-determine attack on KeeLoq. (English) Zbl 1285.94052

Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 35-54 (2012).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of reduced-round MIBS block cipher. (English) Zbl 1294.94033

Heng, Swee-Huay (ed.) et al., Cryptology and network security. 9th international conference, CANS 2010, Kuala Lumpur, Malaysia, December 12–14, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17618-0/pbk). Lecture Notes in Computer Science 6467, 1-19 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Distinguishing distributions using Chernoff information. (English) Zbl 1286.94043

Heng, Swee-Huay (ed.) et al., Provable security. 4th international conference, ProvSec 2010, Malacca, Malaysia, October 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-16279-4/pbk). Lecture Notes in Computer Science 6402, 144-165 (2010).
PDFBibTeX XMLCite
Full Text: DOI Link

Generic attacks on misty schemes. (English) Zbl 1285.94083

Abdalla, Michel (ed.) et al., Progress in cryptology – LATINCRYPT 2010. First international conference on cryptology and information security in Latin America, Puebla, Mexico, August 8–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14711-1/pbk). Lecture Notes in Computer Science 6212, 222-240 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Understanding cryptography. A textbook for students and practitioners. Foreword by Bart Preneel. (English) Zbl 1190.94029

Berlin: Springer (ISBN 978-3-642-04100-6/hbk; 978-3-642-04101-3/ebook). xviii, 372 p. (2010).
MSC:  94A60 68P25 94-01
PDFBibTeX XMLCite
Full Text: DOI

Linear (hull) and algebraic cryptanalysis of the block cipher PRESENT. (English) Zbl 1287.94088

Garay, Juan A. (ed.) et al., Cryptology and network security. 8th international conference, CANS 2009, Kanazawa, Japan, December 12–14, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10432-9/pbk). Lecture Notes in Computer Science 5888, 58-75 (2009).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Algebraic and slide attacks on KeeLoq. (English) Zbl 1154.68388

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 97-115 (2008).
MSC:  68P25 68W30 94A60
PDFBibTeX XMLCite
Full Text: DOI

Related-key rectangle attacks on reduced AES-192 and AES-256. (English) Zbl 1186.94455

Biryukov, Alex (ed.), Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26–28, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74617-1/pbk). Lecture Notes in Computer Science 4593, 225-241 (2007).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Security analysis of constructions combining FIL random oracles. (English) Zbl 1186.94470

Biryukov, Alex (ed.), Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26–28, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74617-1/pbk). Lecture Notes in Computer Science 4593, 119-136 (2007).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Algebraic cryptanalysis of the data encryption standard. (English) Zbl 1154.94386

Galbraith, Steven D. (ed.), Cryptography and coding. 11th IMA international conference, Cirencester, UK, December 18–20, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77271-2/pbk). Lecture Notes in Computer Science 4887, 152-169 (2007).
MSC:  94A60 68P25 68W30
PDFBibTeX XMLCite
Full Text: DOI

Some notes on the security of the timed efficient stream loss-tolerant authentication scheme. (English) Zbl 1161.68441

Biham, Eli (ed.) et al., Selected areas in cryptography. 13th international workshop, SAC 2006, Montreal, Canada, August 17–18, 2006. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74461-0/pbk). Lecture Notes in Computer Science 4356, 342-357 (2007).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Combining compression functions and block cipher-based hash functions. (English) Zbl 1172.94596

Lai, Xuejia (ed.) et al., Advances in cryptology – ASIACRYPT 2006. 12th international conference on the theory and application of cryptology and information security, Shanghai, China, December 3–7, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49475-1/pbk). Lecture Notes in Computer Science 4284, 315-331 (2006).
MSC:  94A60 68P30
PDFBibTeX XMLCite
Full Text: DOI

On exact algebraic [non-]immunity of s-boxes based on power functions. (English) Zbl 1176.94036

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 76-86 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of a white box AES implementation. (English) Zbl 1117.94310

Handschuh, Helena (ed.) et al., Selected areas in cryptography. 11th international workshop, SAC 2004, Waterloo, Canada, August 9–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24327-5/pbk). Lecture Notes in Computer Science 3357, 227-240 (2005).
MSC:  94A60 68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

A theoretical treatment of related-key attacks: RKA-PRPs, RKA-PRFs, and applications. (English) Zbl 1038.94520

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 491-506 (2003).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

A toolbox for cryptanalysis: Linear and affine equivalence algorithms. (English) Zbl 1038.94521

Biham, Eli (ed.), Advances in cryptology – EUROCRYPT 2003. International conference on the theory and applications of cryptographic techniques, Warsaw, Poland, May 4–8, 2003. Proceedings. Berlin: Springer (ISBN 3-540-14039-5/pbk). Lect. Notes Comput. Sci. 2656, 33-50 (2003).
MSC:  94A60 68P25 94A17
PDFBibTeX XMLCite
Full Text: Link

Sliding properties of the DES key schedule and potential extensions to the slide attacks. (English) Zbl 1031.94525

Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 138-148 (2003).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

Security flaws induced by CBC padding - applications to SSL, IPSEC, WTLS. (English) Zbl 1056.94517

Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 534-545 (2002).
MSC:  94A60 68P25 94A62
PDFBibTeX XMLCite
Full Text: Link

Degree of composition of highly nonlinear functions and applications to higher order differential cryptanalysis. (English) Zbl 1056.94512

Knudsen, Lars (ed.), Advances in cryptology - EUROCRYPT 2002. 21st international conference on the theory and applications of cryptographic techniques, Amsterdam, the Netherlands, April 28 – May 2, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43553-0). Lect. Notes Comput. Sci. 2332, 518-533 (2002).
PDFBibTeX XMLCite
Full Text: Link

GEM: a Generic chosen-ciphertext secure Ecryption Method. (English) Zbl 1048.94504

Preneel, Bart (ed.), Topics in cryptology - CT-RSA 2002. The cryptographers’ track at the RSA conference 2002, San José, CA, USA, February 18–22, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43224-8). Lect. Notes Comput. Sci. 2271, 263-276 (2002).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

Fundamentals of cryptology. A professional reference and interactive tutorial. Incl. 1 CD-ROM. (English) Zbl 0991.94002

The Kluwer International Series in Engineering and Computer Science. 528. Dordrecht: Kluwer Academic Publishers. xiv, 491 p. (2000).
PDFBibTeX XMLCite

On the pseudorandomness of top-level schemes of block ciphers. (English) Zbl 0966.94013

Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 289-302 (2000).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Making hash functions from block ciphers secure and efficient by using convolutional codes. (English) Zbl 0969.94017

Imai, Hideki (ed.) et al., Public key cryptography. 3rd international workshop on Practice and theory in public key cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1751, 391-404 (2000).
MSC:  94A60 68P25 94B10
PDFBibTeX XMLCite

Inclusion relations of Boolean functions satisfying \(\text{PC}(l)\) of order \(k\). (English) Zbl 1014.94554

Ding, C. (ed.) et al., Sequences and their applications. Proceedings of the international conference, SETA ’98, Singapore, December 14-17, 1998. London: Springer. Springer Series in Discrete Mathematics and Theoretical Computer Science. 263-272 (1999).
MSC:  94A60 68P25 06E30
PDFBibTeX XMLCite

Recent developments in the design of conventional cryptographic algorithms. (English) Zbl 0955.94016

Preneel, Bart (ed.) et al., State of the art in applied cryptography. Course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997. Revised lectures. Berlin: Springer. Lect. Notes Comput. Sci. 1528, 105-130 (1998).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Cryptanalysis of Rijmen-Preneel trapdoor ciphers. (English) Zbl 0987.94510

Ohta, Kazuo (ed.) et al., Advances in cryptology - ASIACRYPT ’98. International conference on the Theory and application of cryptology and information security, Beijing, China, October 18-22, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1514, 126-132 (1998).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Improved fast software implementation of block ciphers. (Extended abstract). (English) Zbl 0888.94022

Han, Yongfei (ed.) et al., Information and communications security. 1st international conference, ICICS ’97, Beijing, China, November 11–14, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1334, 269-273 (1997).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software