Filtrer vos résultats
- 14
- 11
- 3
- 14
- 1
- 1
- 2
- 1
- 5
- 3
- 1
- 14
- 5
- 5
- 5
- 4
- 4
- 2
- 2
- 2
- 1
- 1
- 1
- 14
- 11
- 5
- 5
- 4
- 3
- 3
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
14 résultats
|
|
triés par
|
|
And Rijndael? Automatic Related-key Differential Analysis of RijndaelAfricaCrypt 2022 - 13th International Conference on Cryptology in Africa, Jul 2022, Fes, Morocco. pp.150-175, ⟨10.1007/978-3-031-17433-9_7⟩
Communication dans un congrès
hal-03671013v1
|
||
|
A Prover-Anonymous and Terrorist-Fraud Resistant Distance-Bounding Protocol9th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec), Jul 2016, Darmstadt, Germany. pp.121-133, ⟨10.1145/2939918.2939919⟩
Communication dans un congrès
hal-01510800v1
|
||
|
Towards Secure TMIS ProtocolsInternational Symposium on Foundations & Practice of Security FPS 2019, Nov 2019, Toulouse, France
Communication dans un congrès
hal-02412793v1
|
||
|
Revisiting AES Related-Key Differential Attacks with Constraint ProgrammingInformation Processing Letters, 2018, 139, pp.24-29. ⟨10.1016/j.ipl.2018.07.001⟩
Article dans une revue
hal-01827727v1
|
||
|
A Terrorist-fraud Resistant and Extractor-free Anonymous Distance-bounding ProtocolAsia Conference on Information, Computer and Communications Security, Apr 2017, Abu Dhabi, United Arab Emirates. pp.800-814, ⟨10.1145/3052973.3053000⟩
Communication dans un congrès
hal-01588560v1
|
||
|
SPADE : un protocole délimiteur de distance anonyme et résistant à la fraude terroristeALGOTEL 2017 - 19èmes Rencontres Francophones sur les Aspects Algorithmiques des Télécommunications, May 2017, Quiberon, France
Communication dans un congrès
hal-01524410v1
|
||
|
Verifiable and Private Oblivious Polynomial Evaluation13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.49-65, ⟨10.1007/978-3-030-41702-4_4⟩
Communication dans un congrès
hal-02412789v1
|
||
|
Survey of Distance Bounding Protocols and ThreatsFoundations and Practice of Security (FPS), Oct 2015, Clermont Ferrand, France. pp.29 - 49, ⟨10.1007/978-3-319-30303-1_3⟩
Communication dans un congrès
hal-01588557v1
|
||
|
Related-Key Cryptanalysis of MidoriInternational Conference on Cryptology in India, Dec 2016, Kolkata, India
Communication dans un congrès
hal-01588566v1
|
||
|
Constraint Programming Models for Chosen Key Differential Cryptanalysis22nd International Conference on Principles and Practice of Constraint Programming (CP 2016), Sep 2016, Toulouse, France. pp.584-601
Communication dans un congrès
hal-01331222v1
|
||
|
Using Constraint Programming to solve a Cryptanalytic ProblemIJCAI 2017 - International Joint Conference on Artificial Intelligence (Sister Conference Best Paper Track), Aug 2017, Melbourne, Australia. pp.4844-4848
Communication dans un congrès
hal-01528272v1
|
||
|
Verifiable Private Polynomial Evaluation11th International Conference on Provable Security (ProvSec 2017), Oct 2017, Xi'an, China. pp.487-506
Communication dans un congrès
hal-01689825v1
|
||
|
Analysis of AES, SKINNY, and Others with Constraint ProgrammingIACR Transactions on Symmetric Cryptology, 2017, 2017 (1), pp.281--306
Article dans une revue
hal-01615487v1
|
||
|
Computing AES related-key differential characteristics with constraint programmingArtificial Intelligence, 2020, 278, pp.103183 (24). ⟨10.1016/j.artint.2019.103183⟩
Article dans une revue
hal-02327893v1
|