Filtrer vos résultats
- 18
- 5
- 13
- 5
- 3
- 1
- 1
- 1
- 23
- 1
- 8
- 1
- 7
- 6
- 23
- 13
- 10
- 5
- 4
- 3
- 3
- 2
- 1
- 1
- 1
- 1
- 1
- 23
- 8
- 7
- 5
- 5
- 3
- 3
- 3
- 3
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
23 résultats
|
|
triés par
|
Improved Analysis of Zorro-Like Ciphers[Research Report] 2014/228, IACR Cryptology ePrint Archive. 2014
Rapport
hal-01092323v1
|
|||
|
Improved Top-Down Techniques in Differential CryptanalysisLATINCRYPT 2015, 2015, Guadalajara, Mexico. ⟨10.1007/978-3-319-22174-8_8⟩
Communication dans un congrès
hal-01235165v1
|
||
|
Improved Generic Attacks Against Hash-based MACs and HAIFAAdvances in Cryptology - CRYPTO 2014, Aug 2014, Santa Barbara, CA, United States. ⟨10.1007/978-3-662-44371-2_9⟩
Communication dans un congrès
hal-01086177v1
|
||
|
Reflections on slide with a twist attacksDesigns, Codes and Cryptography, 2015, 77 (2), pp.633-651. ⟨10.1007/s10623-015-0098-y⟩
Article dans une revue
hal-01235172v1
|
||
Cryptanalysis of FIDESFSE 2014 - 21st International Workshop on Fast Software Encryption, Mar 2014, London, United Kingdom
Communication dans un congrès
hal-01086173v1
|
|||
|
New Attacks on Feistel Structures with Improved Memory ComplexitiesCRYPTO 2015 - 35th Annual Cryptology Conference, 2015, Santa Barbara, United States. pp.433-454, ⟨10.1007/978-3-662-47989-6_21⟩
Communication dans un congrès
hal-01235169v1
|
||
IACR Transactions on Symmetric CryptologyIACR Transactions on Symmetric Cryptology, 2020 (2), 2020
N°spécial de revue/special issue
hal-03141015v1
|
|||
Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDEEUROCRYPT 2015, 2015, Sofia, Bulgaria
Communication dans un congrès
hal-01235168v1
|
|||
|
Out of Oddity – New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof SystemsCRYPTO 2020 - 40th Annual International Cryptology Conference, Aug 2020, Santa Barbara / Virtual, United States. pp.299-328, ⟨10.1007/978-3-030-56877-1_11⟩
Communication dans un congrès
hal-03090185v1
|
||
IACR Transactions on Symmetric CryptologyIACR Transactions on Symmetric Cryptology, 2021 (1), 2021
N°spécial de revue/special issue
hal-04333264v1
|
|||
|
Generic Attacks on Hash CombinersJournal of Cryptology, 2020, 33 (3), pp.742-823. ⟨10.1007/s00145-019-09328-w⟩
Article dans une revue
hal-02424905v1
|
||
|
Security of the STARK-friendly hash functionsDagstuhl Seminar 20041 - Symmetric Cryptography, Jan 2020, Dagstuhl, Germany
Communication dans un congrès
hal-03143904v1
|
||
IACR Transactions on Symmetric CryptologyIACR Transactions on Symmetric Cryptology, 2020 (S1), 2020
N°spécial de revue/special issue
hal-03141018v1
|
|||
|
Improved Generic Attacks Against Hash-Based MACs and HAIFAAlgorithmica, 2017, Special Issue: Algorithmic Tools in Cryptography, 79 (4), pp.1161--1195. ⟨10.1007/s00453-016-0236-6⟩
Article dans une revue
hal-01407953v1
|
||
IACR Transactions on Symmetric CryptologyFrance. IACR Transactions on Symmetric Cryptology, 2020 (4), 2020
N°spécial de revue/special issue
hal-03141017v1
|
|||
|
Cryptanalysis of SP Networks with Partial Non-Linear LayersAdvances in Cryptology - Eurocrypt 2015, Eurocrypt 2015 : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Apr 2015, Sofia, Bulgaria. pp.315-342, ⟨10.1007/978-3-662-46800-5_13⟩
Communication dans un congrès
hal-01108331v1
|
||
|
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64FSE 2014 - 21st International Workshop on Fast Software Encryption, Mar 2014, London, United Kingdom. pp.390-410, ⟨10.1007/978-3-662-46706-0_20⟩
Communication dans un congrès
hal-01086175v1
|
||
|
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge FunctionEUROCRYPT 2015 - Advances in Cryptology, 2015, Sofia, Bulgaria. ⟨10.1007/978-3-662-46800-5_28⟩
Communication dans un congrès
hal-01235167v1
|
||
IACR Transactions on Symmetric CryptologyIACR Transactions on Symmetric Cryptology, 2020 (3), 2020
N°spécial de revue/special issue
hal-03141016v1
|
|||
|
Report on the Security of STARK-friendly Hash Functions (Version 2.0)2020
Pré-publication, Document de travail
hal-02883253v1
|
||
|
Cryptanalysis of Iterated Even-Mansour Schemes with Two KeysASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Dec 2014, Kaoshiung, Taiwan. pp.439-457, ⟨10.1007/978-3-662-45611-8_23⟩
Communication dans un congrès
hal-01086179v1
|
||
Improved Differential Cryptanalysis of Round-Reduced SpeckSAC 2014 - 21st International Conference Selected Areas in Cryptography, Aug 2014, Montreal, Canada
Communication dans un congrès
hal-01086176v1
|
|||
|
Optimized Interpolation Attacks on LowMCASIACRYPT 2015, 2015, Auckland, New Zealand. pp.535-560, ⟨10.1007/978-3-662-48800-3_22⟩
Communication dans un congrès
hal-01235171v1
|