Works matching DE "ALGEBRAIC attacks (Cryptography)"
Results: 24
Strengthening Crypto-1 Cipher Against Algebraic Attacks.
- Published in:
- Journal of ICT Research & Applications, 2015, v. 9, n. 1, p. 88, doi. 10.5614/itbj.ict.res.appl.2015.9.1.5
- By:
- Publication type:
- Article
RGB, a Mixed Multivariate Signature Scheme.
- Published in:
- Computer Journal, 2016, v. 59, n. 4, p. 439, doi. 10.1093/comjnl/bxv056
- By:
- Publication type:
- Article
MRHS solver based on linear algebra and exhaustive search.
- Published in:
- Journal of Mathematical Cryptology, 2018, v. 12, n. 3, p. 143, doi. 10.1515/jmc-2017-0005
- By:
- Publication type:
- Article
Challenging the increased resistance of regular hash functions against birthday attacks.
- Published in:
- Journal of Mathematical Cryptology, 2012, v. 6, n. 3/4, p. 229, doi. 10.1515/jmc-2011-0010
- By:
- Publication type:
- Article
Applications of SAT Solvers in Cryptanalysis: Finding Weak Keys and Preimages.
- Published in:
- Journal of Politics in Latin America, 2014, v. 6, n. 2, p. 1
- By:
- Publication type:
- Article
Linear Decomposition Method in Analyzing Hidden Information Protocols on Algebraic Platforms.
- Published in:
- Algebra & Logic, 2015, v. 54, n. 1, p. 81, doi. 10.1007/s10469-015-9327-8
- By:
- Publication type:
- Article
Cryptanalytic Attacks on International Data Encryption Algorithm Block Cipher.
- Published in:
- Defence Science Journal, 2016, v. 66, n. 6, p. 582, doi. 10.14429/dsj.66.10798
- By:
- Publication type:
- Article
ON WEAK ROTORS, LATIN SQUARES, LINEAR ALGEBRAIC REPRESENTATIONS, INVARIANT DIFFERENTIALS AND CRYPTANALYSIS OF ENIGMA.
- Published in:
- Rad HAZU: Matematicke Znanosti, 2021, v. 25, p. 51, doi. 10.21857/y26kec4k89
- By:
- Publication type:
- Article
A NEW REPRESENTATION OF S-BOXES FOR ALGEBRAIC DIFFERENTIAL CRYPTANALYSIS.
- Published in:
- Rad HAZU: Matematicke Znanosti, 2021, v. 25, p. 33, doi. 10.21857/yvjrdcl0ey
- By:
- Publication type:
- Article
CONSTRUCTING COMMUTATIVE SEMIFIELDS OF SQUARE ORDER.
- Published in:
- Advances in Mathematics of Communications, 2016, v. 10, n. 2, p. 291, doi. 10.3934/amc.2016006
- By:
- Publication type:
- Article
Homomorphic MAC from Algebraic One-Way Functions for Network Coding with Small Key Size.
- Published in:
- Computer Journal, 2017, v. 60, n. 12, p. 1785, doi. 10.1093/comjnl/bxx055
- By:
- Publication type:
- Article
USING LOCAL REDUCTION FOR THE EXPERIMENTAL EVALUATION OF THE CIPHER SECURITY.
- Published in:
- Computing & Informatics, 2018, v. 37, n. 2, p. 349, doi. 10.4149/cai_2018_2_349
- By:
- Publication type:
- Article
Algebraic techniques on searching linear diffusion layers in block cipher.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 17, p. 4285, doi. 10.1002/sec.1606
- By:
- Publication type:
- Article
Parallel Gaussian elimination for XL family over GF(2).
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 3, p. 503, doi. 10.1002/sec.744
- By:
- Publication type:
- Article
Rotation-k Affine-Power-Affine-like Multiple Substitution-Boxes for Secure Communication.
- Published in:
- International Journal of Advanced Research in Computer Science, 2016, v. 7, n. 3, p. 44
- By:
- Publication type:
- Article
A CLASS OF 1-RESILIENT BOOLEAN FUNCTIONS WITH OPTIMAL ALGEBRAIC IMMUNITY AND GOOD BEHAVIOR AGAINST FAST ALGEBRAIC ATTACKS.
- Published in:
- International Journal of Foundations of Computer Science, 2014, v. 25, n. 6, p. 763, doi. 10.1142/S0129054114500324
- By:
- Publication type:
- Article
Classified Structures and Comparisons of Cryptanalysis of Wg-7, Wg-8 and Wg-16 Stream Ciphers.
- Published in:
- Technical Journal of University of Engineering & Technology Taxila, 2018, v. 23, n. 2, p. 56
- By:
- Publication type:
- Article
Message from the Guest Editors.
- Published in:
- 2016
- By:
- Publication type:
- Editorial
Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption.
- Published in:
- International Journal of Information Security, 2016, v. 15, n. 1, p. 35, doi. 10.1007/s10207-015-0287-8
- By:
- Publication type:
- Article
Efficient attribute-based signature and signcryption realizing expressive access structures.
- Published in:
- International Journal of Information Security, 2016, v. 15, n. 1, p. 81, doi. 10.1007/s10207-015-0289-6
- By:
- Publication type:
- Article
On selection of samples in algebraic attacks and a new technique to find hidden low degree equations.
- Published in:
- International Journal of Information Security, 2016, v. 15, n. 1, p. 51, doi. 10.1007/s10207-015-0295-8
- By:
- Publication type:
- Article
FROM BI-IMMUNITY TO ABSOLUTE UNDECIDABILITY.
- Published in:
- Journal of Symbolic Logic, 2013, v. 78, n. 4, p. 1218, doi. 10.2178/jsl.7804120
- By:
- Publication type:
- Article
The Security Weakness of Block Cipher Piccolo against Fault Analysis.
- Published in:
- International Journal of Distributed Sensor Networks, 2014, p. 1, doi. 10.1155/2014/842675
- By:
- Publication type:
- Article
On the Linear Complexity of Ding-Helleseth Generalized Cyclotomic Binary Sequences of Order Four and Six.
- Published in:
- European Journal of Pure & Applied Mathematics, 2014, v. 7, n. 3, p. 256
- By:
- Publication type:
- Article