DOCSLIB.ORG
  • Sign Up
  • Log In
  • Upload
  • Sign Up
  • Log In
  • Upload
  • Home
  • »  Tags
  • »  Correlation attack

Correlation attack

  • A Novel and Highly Efficient AES Implementation Robust Against Differential Power Analysis Massoud Masoumi K

    A Novel and Highly Efficient AES Implementation Robust Against Differential Power Analysis Massoud Masoumi K

  • Security Evaluation of the K2 Stream Cipher

    Security Evaluation of the K2 Stream Cipher

  • Fast Correlation Attacks: Methods and Countermeasures

    Fast Correlation Attacks: Methods and Countermeasures

  • Effects of Architecture on Information Leakage of a Hardware Advanced Encryption Standard Implementation Eric A

    Effects of Architecture on Information Leakage of a Hardware Advanced Encryption Standard Implementation Eric A

  • Security in the GSM Network

    Security in the GSM Network

  • Stream Cipher Designs: a Review

    Stream Cipher Designs: a Review

  • Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt

    Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt

  • AEGIS: a Fast Authenticated Encryption Algorithm⋆ (Full Version)

    AEGIS: a Fast Authenticated Encryption Algorithm⋆ (Full Version)

  • Biryukov, Shamir, “Wagner: Real Time Cryptanalysis of A5/1 on a PC,”

    Biryukov, Shamir, “Wagner: Real Time Cryptanalysis of A5/1 on a PC,”

  • Analysis of Lightweight Stream Ciphers

    Analysis of Lightweight Stream Ciphers

  • 24 Apr 2014 a Previous Block Cipher Known As MISTY1[10], Which Was Chosen As the Foundation for the 3GPP Confidentiality and Integrity Algorithm[14]

    24 Apr 2014 a Previous Block Cipher Known As MISTY1[10], Which Was Chosen As the Foundation for the 3GPP Confidentiality and Integrity Algorithm[14]

  • Fast Correlation Attacks on Certain Stream Ciphers

    Fast Correlation Attacks on Certain Stream Ciphers

  • Improvements to Correlation Attacks Against Stream Ciphers with Nonlinear Combiners Brian Stottler Elizabethtown College, Stottlerb@Etown.Edu

    Improvements to Correlation Attacks Against Stream Ciphers with Nonlinear Combiners Brian Stottler Elizabethtown College, [email protected]

  • Power Analysis Attacks Against IEEE 802.15.4 Nodes (Extended Version of COSADE 2016 Paper)

    Power Analysis Attacks Against IEEE 802.15.4 Nodes (Extended Version of COSADE 2016 Paper)

  • 6.5.4 Nested Authentication Attack

    6.5.4 Nested Authentication Attack

  • Physical Attacks and Countermeasures on the Advanced Encryption Standard

    Physical Attacks and Countermeasures on the Advanced Encryption Standard

  • Design of a New Stream Cipher: PALS

    Design of a New Stream Cipher: PALS

  • A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions

    A Secure Random Number Generator with Immunity and Propagation Characteristics for Cryptography Functions

Top View
  • Survey and Benchmark of Block Ciphers for Wireless Sensor Networks
  • Performance and Statistical Analysis of Stream Ciphers in GSM Communications Nagendar Yerukala, V Kamakshi Prasad, and Allam Apparao
  • Cache Misses and the Recovery of the Full AES 256 Key
  • Arxiv:1404.6100V4 [Cs.CR] 14 Oct 2014
  • A Library of C++ Classes for Vector Boolean Functions in Cryptography
  • Attacks on Stream Ciphers: a Perspective
  • Lightweight Block Ciphers for Iot Based Applications: a Review
  • Side-Channel-Attack Resistant AES Design Based on Finite Field Construction Variation
  • A 270 Attack on the Full MISTY1
  • Cryptanalysis: Correlation Attacks on LFSR-Based Stream Ciphers
  • A New Stream Cipher: Dicing
  • Cryptanalysis of AES-PRF and Its Dual
  • Fast Correlation Attacks: Methods and Countermeasures
  • AEGIS: a Fast Authenticated Encryption Algorithm (V1)
  • Analysis and Design of Block Ciphers
  • This Is a Chapter from the Handbook of Applied Cryptography, by A
  • Correlation-Enhanced Power Analysis Collision Attack
  • Project 3: Correlation Attack


© 2024 Docslib.org    Feedback