TU Darmstadt / ULB / TUbiblio

Items in division

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: B | M | N | S | W
Number of items at this level: 11.

B

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes
Dawson, E. (ed.) :

Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: Lecture Notes in Computer Science , 7779 . Springer
[Conference or Workshop Item] , (2013)

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes :
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3) 997-1022 (2014).
[Article] , (2013)

Bulygin, Stanislav and Walter, Michael :
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.

[Report] , (2012)

M

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes :
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering pp. 139-156.
[Article] , (2013)

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes :
Improved Algebraic Side-Channel Attack on AES.
2012 IEEE International Symposium on Hardware-Oriented Security and Trust IEEE
[Conference or Workshop Item] , (2012)

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Buchmann, Johannes
Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) :

Using SAT Solving to Improve Differential Fault Analysis of Trivium.
In: Communications in Computer and Information Science , 200 . Springer
[Conference or Workshop Item] , (2011)

N

Nie, Xuyun and Petzoldt, Albrecht and Buchmann, Johannes :
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
In: LNCS (8128).
[Conference or Workshop Item] , (2013)

S

Strenzke, Falko :
Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems.
In: LNCS (7932). Springer
[Conference or Workshop Item] , (2013)

W

Wunderer, Thomas :
On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks.
[Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8082]
Technische Universität , Darmstadt
[Ph.D. Thesis], (2018)

Wälde, Julian :
Algebraic Cryptanalysis of Round Reduced Versions of CSA and the LED Family of Block Ciphers.
TU Darmstadt
[Master Thesis] , (2013)

Walter, Michael and Bulygin, Stanislav and Buchmann, Johannes
Kutylowski, Miroslaw and Yung, Moti (eds.) :

Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC.
In: Lecture Notes in Computer Science , 7763 . Springer
[Conference or Workshop Item] , (2012)

This list was generated on Sun May 19 01:21:53 2019 CEST.