Search

Your search keyword '"Cryptanalyse (CRYPT)"' showing total 40 results

Search Constraints

Start Over You searched for: Author "Cryptanalyse (CRYPT)" Remove constraint Author: "Cryptanalyse (CRYPT)"
40 results on '"Cryptanalyse (CRYPT)"'

Search Results

1. Counting Co-Cyclic Lattices

2. A note on BDD problems with λ2-gap

3. A Genetic Algorithm for Searching the Shortest Lattice Vector of SVP Challenge

4. The Hardness of Lattice Problems: Worst-case to Average-case Reductions and Security Estimates

5. Finding Shortest Lattice Vectors in the Presence of Gaps

6. Improved Attacks on Reduced-Round Camellia-128/192/256

7. Simpler Efficient Group Signatures from Lattices

8. Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia

9. Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256

10. The Algorithmic Revolution in Geometry of Numbers

11. Approximating the densest sublattice from Rankin's inequality

12. A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012

13. Advances in Cryptology - EUROCRYPT 2014: 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings

14. Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences

15. New transference theorems on lattices possessing $n^ϵ-unique$ shortest vectors

16. Cryptanalysis of GOST R hash function

17. Lower bounds of shortest vector lengths in random NTRU lattices

18. Abstracting Lattice-based Cryptography

19. Improvements on Reductions among DIfferent Variants SVP and CVP

20. A Three-Level Sieve Algorithm for the Shortest Vector Problem

21. Fault Rate Analysis: Breaking Masked AES Hardware Implementations Efficiently

22. Lattices and Finite Groups: Mathematics, Complexity and Cryptography

23. Advances in Cryptology -- EUROCRYPT 2013

24. Solving BDD by Enumeration: An Update

25. Tribo-aero-electrostatic separator for coarse granular insulating materials

26. Improved Boomerang Attacks on SM3

27. Slide reduction, successive minima and several applications

28. Advances in Cryptology - ASIACRYPT 2012

29. Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures

30. Improved Cryptanalysis of the Block Cipher KASUMI

31. The Boomerang Attacks on the Round-Reduced Skein-512

32. An Algebraic Broadcast Attack against NTRU

33. Cryptanalysis of a homomorphic encryption scheme from ISIT 2008

34. An efficient broadcast attack against NTRU

35. Faster Algorithms for Approximate Common Divisors: Breaking Fully-Homomorphic-Encryption Challenges over the Integers

36. New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia

37. Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic

38. Lattice-Based Fault Attacks on Signatures

39. Sub-Linear Root Detection, and New Hardness Results, for Sparse Polynomials Over Finite Fields

40. The LLL Algorithm: Survey and Applications

Catalog

Books, media, physical & digital resources