Sciweavers

59 search results - page 3 / 12
» Key-Recovery Attacks on ASASA
Sort
View
AFRICACRYPT
2008
Springer
15 years 4 months ago
Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers
Simon Fischer 0002, Shahram Khazaei, Willi Meier
PKC
2007
Springer
165views Cryptology» more  PKC 2007»
15 years 4 months ago
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA
Abstract. For RSA, May showed a deterministic polynomial time equivalence of computing d to factoring N(= pq). On the other hand, Takagi showed a variant of RSA such that the decry...
Noboru Kunihiro, Kaoru Kurosawa
ACISP
2006
Springer
15 years 4 months ago
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant
Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie...
ACISP
2003
Springer
15 years 3 months ago
Key Recovery Attacks on NTRU without Ciphertext Validation Routine
NTRU is an efficient public-key cryptosystem proposed by Hoffstein, Pipher, and Silverman. Assuming access to a decryption oracle, we show ways to recover the private key of NTRU ...
Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon
EUROCRYPT
2010
Springer
15 years 3 months ago
Key Recovery Attacks of Practical Complexity on AES-256 Variants with up to 10 Rounds
Alex Biryukov, Orr Dunkelman, Nathan Keller, Dmitr...