DOCSLIB.ORG
Explore
Sign Up
Log In
Upload
Search
Home
» Tags
» Cube attack
Cube attack
Key‐Dependent Side‐Channel Cube Attack on CRAFT
Some Observations on ACORN V1 and Trivia-SC
Cube Attacks on Tweakable Black Box Polynomials
Cryptanalysis with Cube Attack
Cryptographic Hash Functions for Image Processing
Algebraic Differential Attacks on Symmetric Cryptography
Correlation Cube Attacks: from Weak-Key Distinguisher to Key Recovery
M. Tech. (COMPUTER NETWORKS and INFORMATION SECURITY) Two Year PG Day-Time Program (With Effect from 2019 – 20)
Cube Attack on Reduced-Round Quavium Shiyong Zhang
Cryptanalysis of Symmetric Encryption Algorithms Colin Chaigneau
White Paper Ap5 Cyber Security
The Cube Attack on Courtois Toy Cipher
Cube Attacks on Non-Blackbox Polynomials Based on Division Property
The Cube Attack on Stream Cipher Trivium and Quadraticity Tests∗
A New Model for Error-Tolerant Side-Channel Cube Attacks ⋆
Cube Testers and Key Recovery in Symmetric Cryptography
View the Index
Fast Algebraic Cryptanalysis in Finite Fields of Higher Order with the Cube Attack
Top View
Side Channel Cube Attacks on Block Ciphers
Algebraic Cryptanalysis of Deterministic Symmetric Encryption
Cube Attacks on the Stream Cipher Grain-V1 Yong-Juan Wanga*, Shi
Links Between Division Property and Other Cube Attack Variants
Side- Channel Cube Attack on Simeck32/64
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function
Enhancing the Cube Attack by Extracting Low-Degree Non-Linear Equations
On the Security of Lblock Against the Cube Attack and Side Channel Cube Attack Saad Islam, Mehreen Afzal, Adnan Rashdi
Cube Attacks on Cryptographic Hash Functions Joel Lathrop
Cube Attacks on Stream Ciphers Based on Division Property
V5I4201632.Pdf
Another View on Cube Attack, Cube Tester, AIDA and Higher Order Differential Cryptanalysis
On Recent Higher-Order Cryptanalysis Techniques
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
78105944.Pdf
Toward a More Efficient Gröbner-Based Algebraic
Cube Attacks on Trivium
On the Security of NOEKEON Against Side Channel Cube Attacks
Symmetric Cryptography
Automated Dynamic Cube Attack on Block Ciphers: Cryptanalysis of SIMON and KATAN
SMT-Based Cube Attack on Simeck32/64
Cryptanalysis of Selected Block Ciphers
Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
Cube Attacks on Non-Blackbox Polynomials Based on Division Property
Application of Cube Attack to Block and Stream Ciphers
Cube-Based Cryptanalysis of Subterranean-SAE
Side Channel Cube Attacks on PRESENT