DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Attack model
Attack model
Improved Related-Key Attacks on DESX and DESX+
Models and Algorithms for Physical Cryptanalysis
On the Related-Key Attacks Against Aes*
A Practical Attack on the Fixed RC4 in the WEP Mode
Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers
Public Evaluation Report UEA2/UIA2
Practical Attacks Against CCA2 Secure Cryptosystems, and Countermeasures
From Semantic Security to Chosen Ciphertext Security Sahnghyun Cha Iowa State University
A Pattern Recognition Approach to Block Cipher
Adversary Model: Adaptive Chosen Ciphertext Attack with Timing Attack
Active and Passive Side-Channel Key Recovery Attacks on Ascon
Attacks and Countermeasures for White-Box Designs⋆
Security Analysis of PRINCE
Geoencryption with Loran
Related-Key Cryptanalysis of the Full AES-192 and AES-256
Comparison of White Box, Black Box and Gray Box Cryptography
Practical Known-Plaintext Attacks Against Physical Layer Security in Wireless MIMO Systems
Security Analysis of KNOT-AEAD and KNOT-Hash
Top View
RC4-Accsuite: a Hardware Acceleration Suite for RC4-Like Stream Ciphers
Cache Timing Analysis of RC4
Neural Aided Statistical Attack for Cryptanalysis Yi Chen, Yantian Shen, Hongbo Yu
Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
Smart Card Fault Attacks on Public Key and Elliptic Curve Cryptography
A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3
Electromagnetic and Power Side-Channel Analysis: Advanced Attacks and Low-Overhead Generic Countermeasures Through White-Box Approach
A Practical Forgery and State Recovery Attack on the Authenticated Cipher PANDA-S?
Known-Key Distinguisher on Full PRESENT
Introduction to Cryptography
Lecture 8 1 Some More Security Definitions for Encryption Schemes
Lecture Notes on Stream Ciphers and RC4
Novel Side-Channel Attacks on Emerging Cryptographic Algorithms and Computing Systems
The Rectangle Attack and Other Techniques for Cryptanalysis of Block Ciphers
A Theoretical Treatment of Related-Key Attacks: RKA-Prps, RKA-Prfs, and Applications
A Theoretical Treatment of Related-Key Attacks: RKA-Prps, RKA-Prfs, and Applications
RC4 Stream Cipher and Possible Attacks on WEP
Cryptography in the Real World
A Review on Combined Attacks on Security Systems
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication?
On the Security Goals of White-Box Cryptography
Neural Cryptanalysis for Cyber-Physical System Ciphers
Feature Extraction for Side-Channel Attacks Eleonora Cagli
Lecture 3 1 Chosen Plaintext Attack
Cryptography Best Practices Outline Architectures (1A) (Sym
Protection of Data from Cipher-Text Only Attack Using Key Based Interval Splitting
Side-Channel Attacks on RISC-V Processors: Current Progress, Challenges, and Opportunities
Attacking Post-Quantum Cryptography
Introduction
Cryptanalytic Attacks on International Data Encryption Algorithm Block Cipher
Remodelling RC4 Algorithm for Secure Communication for WEP
Easy Understandings of Known-Key Attacks
Collision Attacks on OCB
Relations Among Notions of Security for Public-Key Encryption Schemes
Securing Sensor Nodes Against Side Channel Attacks
Power Side-Channel Attack Analysis: a Review of 20 Years of Study for the Layman
A Note on Quantum Related-Key Attacks
Chosen-Plaintext Attack Ciphertext-Only Attack Known-Plaintext Attack
Romulus V1.3 Specification