×

Found 91 Documents (Results 1–91)

Enhancing the related-key security of PIPO through new key schedules. (English) Zbl 07857806

Seo, Hwajeong (ed.) et al., Information security and cryptology – ICISC 2023. 26th international conference on information security and cryptology, ICISC 2023, Seoul, South Korea, November 29 – December 1, 2023. Revised selected papers. Part I. Singapore: Springer. Lect. Notes Comput. Sci. 14561, 3-18 (2024).
MSC:  68M25 68P25 94A60
Full Text: DOI

Efficient leakage-resilient MACs without idealized assumptions. (English) Zbl 1514.94040

Tibouchi, Mehdi (ed.) et al., Advances in cryptology – ASIACRYPT 2021. 27th international conference on the theory and application of cryptology and information security, Singapore, December 6–10, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13091, 95-123 (2021).
MSC:  94A60
Full Text: DOI

ZCZ – achieving \(n\)-bit SPRP security with a minimal number of tweakable-block-cipher calls. (English) Zbl 1446.94103

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 336-366 (2018).
MSC:  94A60
Full Text: DOI

Building quantum-one-way functions from block ciphers: Davies-Meyer and Merkle-Damgård constructions. (English) Zbl 1446.94139

Peyrin, Thomas (ed.) et al., Advances in cryptology – ASIACRYPT 2018. 24th international conference on the theory and application of cryptology and information security, Brisbane, QLD, Australia, December 2–6, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11272, 275-304 (2018).
MSC:  94A60
Full Text: DOI

Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT. (English) Zbl 1398.94157

Inomata, Atsuo (ed.) et al., Advances in information and computer security. 13th international workshop on security, IWSEC 2018, Sendai, Japan, September 3–5, 2018. Proceedings. Cham: Springer (ISBN 978-3-319-97915-1/pbk; 978-3-319-97916-8/ebook). Lecture Notes in Computer Science 11049, 227-243 (2018).
MSC:  94A60 90C10
Full Text: DOI

Related-key impossible-differential attack on reduced-round Skinny. (English) Zbl 1521.94024

Gollmann, Dieter (ed.) et al., Applied cryptography and network security. 15th international conference, ACNS 2017, Kanazawa, Japan, July 10–12, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10355, 208-228 (2017).
MSC:  94A60
Full Text: DOI

Impossible-differential and boomerang cryptanalysis of round-reduced Kiasu-BC. (English) Zbl 1383.94018

Handschuh, Helena (ed.), Topics in cryptology – CT-RSA 2017. The cryptographers’ track at the RSA conference 2017, San Francisco, CA, USA, February 14–17, 2017. Proceedings. Cham: Springer (ISBN 978-3-319-52152-7/pbk; 978-3-319-52153-4/ebook). Lecture Notes in Computer Science 10159, 207-222 (2017).
MSC:  94A60
Full Text: DOI

Efficient beyond-birthday-bound-secure deterministic authenticated encryption with minimal stretch. (English) Zbl 1346.94102

Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4–6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 317-332 (2016).
MSC:  94A60 94A62
Full Text: DOI

Algebraic attacks using binary decision diagrams. (English) Zbl 1401.94171

Ors, Berna (ed.) et al., Cryptography and information security in the Balkans. First international conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16–17, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-21355-2/pbk; 978-3-319-21356-9/ebook). Lecture Notes in Computer Science 9024, 40-54 (2015).
MSC:  94A60
Full Text: DOI

An all-in-one approach to differential cryptanalysis for small block ciphers. (English) Zbl 1327.94025

Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15–16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 1-15 (2013).
MSC:  94A60

Estimating resistance against multidimensional linear attacks: an application on DEAN. (English) Zbl 1311.94085

Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 246-262 (2013).
MSC:  94A60
Full Text: DOI

Compact hardware implementations of the block ciphers mCRYPTON, NOEKEON, and SEA. (English) Zbl 1295.94132

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 358-377 (2012).
MSC:  94A60 68P25
Full Text: DOI

A cryptanalysis of PRINTcipher: the invariant subspace attack. (English) Zbl 1287.94080

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 206-221 (2011).
MSC:  94A60
Full Text: DOI

Cryptanalysis of PRESENT-like ciphers with secret S-boxes. (English) Zbl 1307.94038

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 270-289 (2011).
MSC:  94A60
Full Text: DOI

Differential cryptanalysis of round-reduced printcipher: computing roots of permutations. (English) Zbl 1282.94029

Joux, Antoine (ed.), Fast software encryption. 18th international workshop, FSE 2011, Lyngby, Denmark, February 13–16, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21701-2/pbk). Lecture Notes in Computer Science 6733, 1-17 (2011).
MSC:  94A60
Full Text: DOI

PRINTcipher: a block cipher for IC-printing. (English) Zbl 1297.94080

Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 16-32 (2010).
MSC:  94A60 68P25
Full Text: DOI

The current status in design of efficient provably secure cryptographic pseudorandom generators. (English) Zbl 1160.94012

Li, Yongqing (ed.) et al., Coding and cryptology. Proceedings of the first international workshop, Wuyi Mountain, Fujian, China, June 11–15, 2007. Hackensack, NJ: World Scientific (ISBN 978-981-283-223-8/hbk). Series on Coding Theory and Cryptology 4, 233-255 (2008).
MSC:  94A60 65C10
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

Biographic Reference

all top 3

Software