Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
583
search results - page 7 / 117
»
On the Complexity of Matsui's Attack
Sort
relevance
views
votes
recent
update
View
thumb
title
15
click to vote
SACRYPT
2007
Springer
83
views
Cryptology
»
more
SACRYPT 2007
»
Reduced Complexity Attacks on the Alternating Step Generator
14 years 1 months ago
Download
www.simonfischer.ch
Shahram Khazaei, Simon Fischer 0002, Willi Meier
claim paper
Read More »
16
click to vote
EUROCRYPT
2010
Springer
162
views
Cryptology
»
more
EUROCRYPT 2010
»
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
14 years 2 days ago
Download
crypto.rd.francetelecom.com
Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitr...
claim paper
Read More »
18
click to vote
FSE
2006
Springer
89
views
Cryptology
»
more
FSE 2006
»
The Impact of Carries on the Complexity of Collision Attacks on SHA-1
13 years 11 months ago
Download
www1.spms.ntu.edu.sg
In this article we present a detailed analysis of the impact
Florian Mendel, Norbert Pramstaller, Christian Rec...
claim paper
Read More »
17
click to vote
SECRYPT
2007
77
views
Business
»
more
SECRYPT 2007
»
Remote Algorithmic Complexity Attacks against Randomized Hash Tables
13 years 8 months ago
Download
www.eng.tau.ac.il
Noa Bar-Yosef, Avishai Wool
claim paper
Read More »
20
click to vote
ICC
2009
IEEE
125
views
Communications
»
more
ICC 2009
»
Cryptanalysis of Substitution Cipher Chaining Mode (SCC)
14 years 2 months ago
Download
eprint.iacr.org
In this paper, we present an enhanced cryptanalysis of the Substitution Cipher Chaining mode (SCC) [1]. In [2], SCC-128 (SCC which uses AES with 128-bit key) was broken using 5 att...
Mohamed Abo El-Fotouh, Klaus Diepold
claim paper
Read More »
« Prev
« First
page 7 / 117
Last »
Next »