Linear cryptanalysis

Results: 154



#Item
11A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar Horst G¨ ortz Institute for IT Security Communication Security Group (COSY)

A Family of Light-Weight Block Ciphers Based on DES Suited for RFID Applications Axel Poschmann, Gregor Leander, Kai Schramm, and Christof Paar Horst G¨ ortz Institute for IT Security Communication Security Group (COSY)

Add to Reading List

Source URL: events.iaik.tugraz.at

Language: English - Date: 2006-07-10 00:56:36
12Automatic Tool for Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Automatic Tool for Cryptanalysis Advisor(s): Christoph Dobraunig and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
13Machine Learning in Cryptanalysis Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria  Motivation

Machine Learning in Cryptanalysis Advisor(s): Maria Eichlseder and Florian Mendel Institute for Applied Information Processing and Communications (IAIK) Graz University of Technology, Austria Motivation

Add to Reading List

Source URL: www.iaik.tugraz.at

Language: English - Date: 2015-11-30 11:00:03
14Scientific Report  First name / Family name Dr. Dimitrios Simos

Scientific Report First name / Family name Dr. Dimitrios Simos

Add to Reading List

Source URL: fellowship.ercim.eu

Language: English - Date: 2013-02-27 04:48:46
15Improved Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN Danping Shi1,2,3 , Lei Hu1,2? , Siwei Sun1,2 , Ling Song1,2 1  State Key Laboratory of Information Security, Institute of Information Engineering,

Improved Linear (hull) Cryptanalysis of Round-reduced Versions of KATAN Danping Shi1,2,3 , Lei Hu1,2? , Siwei Sun1,2 , Ling Song1,2 1 State Key Laboratory of Information Security, Institute of Information Engineering,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-11-21 00:31:39
    16Linear Cryptanalysis Kaisa Nyberg Department of Information and Computer Science Aalto University School of Science  June 6, 2013

    Linear Cryptanalysis Kaisa Nyberg Department of Information and Computer Science Aalto University School of Science June 6, 2013

    Add to Reading List

    Source URL: ice.mat.dtu.dk

    Language: English - Date: 2013-06-07 10:08:29
      17Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks C´eline Blondeau and Kaisa Ny

      Joint Data and Key Distribution of the Linear Cryptanalysis Test Statistic and Its Impact to Data Complexity Estimates of Multiple/Multidimensional Linear and Truncated Differential Attacks C´eline Blondeau and Kaisa Ny

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-09-24 15:27:13
        18Mixed-integer Programming based Differential and Linear Cryptanalysis Siwei Sun State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences Data Assurance and Communica

        Mixed-integer Programming based Differential and Linear Cryptanalysis Siwei Sun State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences Data Assurance and Communica

        Add to Reading List

        Source URL: www1.spms.ntu.edu.sg

        Language: English - Date: 2015-10-05 00:19:26
          19Linear Cryptanalysis Kaisa Nyberg Department of Computer Science Aalto University School of Science ❦❛✐s❛✳♥②❜❡r❣❅❛❛❧t♦✳❢✐ S3, Sackville, August 11, 2015

          Linear Cryptanalysis Kaisa Nyberg Department of Computer Science Aalto University School of Science ❦❛✐s❛✳♥②❜❡r❣❅❛❛❧t♦✳❢✐ S3, Sackville, August 11, 2015

          Add to Reading List

          Source URL: mta.ca

          Language: English - Date: 2015-08-17 19:57:43
            20Introduction Linear Cryptanalysis Against SPECK An Implementation of Wallén’s Algorithm Summary  Automatic Search for Linear Trails of the SPECK

            Introduction Linear Cryptanalysis Against SPECK An Implementation of Wallén’s Algorithm Summary Automatic Search for Linear Trails of the SPECK

            Add to Reading List

            Source URL: isc2015.item.ntnu.no

            Language: English - Date: 2015-09-15 05:33:19