TU Darmstadt / ULB / TUbiblio

Items in division

Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: Creators | Date | Item Type | Language | No Grouping
Jump to: B | M | N | S | W
Number of items at this level: 11.

B

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes Dawson, E. (ed.) (2013):
Many weak keys for PRINTcipher: fast key recovery and countermeasures.
In: Lecture Notes in Computer Science, 7779, In: RSA Conference Cryptographer's Track (CT-RSA 2013), Springer, pp. 189–206, [Conference or Workshop Item]

Bulygin, Stanislav and Walter, Michael and Buchmann, Johannes (2013):
Full analysis of PRINTcipher with respect to invariant subspace attack: efficient key recovery and countermeasures.
In: Designs, Codes, and Cryptography 73(3), pp. 997-1022 (2014), DOI: 10.1007/s10623-013-9840-5,
[Article]

Bulygin, Stanislav and Walter, Michael (2012):
Study of the invariant coset attack on PRINTcipher: more weak keys with practical key recovery.
(2012/085), [Report]

M

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes (2013):
Improved Algebraic Side-Channel Attack on AES.
In: Journal of Cryptographic Engineering, pp. 139-156, [Article]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Zohner, Michael and Heuser, Annelie and Walter, Michael and Buchmann, Johannes (2012):
Improved Algebraic Side-Channel Attack on AES.
In: 2012 IEEE International Symposium on Hardware-Oriented Security and Trust, IEEE, pp. 146 - 151, ISBN 978-1-4673-2341-3,
DOI: 10.1109/HST.2012.6224335,
[Conference or Workshop Item]

Mohamed, Mohamed Saied Emam and Bulygin, Stanislav and Buchmann, Johannes Kim, Tai-Hoon and Adeli, Hojjat and Robles, Rosslin John and Balitanas, Maricel (eds.) (2011):
Using SAT Solving to Improve Differential Fault Analysis of Trivium.
In: Communications in Computer and Information Science, 200, In: Proceedings of "The 5th International Conference on Information Security and Assurance" ISA 2011, Springer, Brno, Czech Republic, pp. 62-71, DOI: 10.1007/978-3-642-23141-4_7,
[Conference or Workshop Item]

N

Nie, Xuyun and Petzoldt, Albrecht and Buchmann, Johannes (2013):
Cryptanalysis of 2-layer Nonlinear Piece In Hand Method.
In: LNCS, In: Second International Workshop on Modern Cryptography and Security Engineering - MoCrySen 2013, Regensburg, Germany, pp. 91-104, [Conference or Workshop Item]

S

Strenzke, Falko (2013):
Timing Attacks against the Syndrome Inversion in Code-Based Cryptosystems.
In: LNCS, In: Fifth International Conference on Post-Quantum Cryptography - PQCrypto 2013, Springer, Limoges, France, pp. 217-230, [Conference or Workshop Item]

W

Wunderer, Thomas (2018):
On the Security of Lattice-Based Cryptography Against Lattice Reduction and Hybrid Attacks.
Darmstadt, Technische Universität, [Online-Edition: https://tuprints.ulb.tu-darmstadt.de/8082],
[Ph.D. Thesis]

Wälde, Julian (2013):
Algebraic Cryptanalysis of Round Reduced Versions of CSA and the LED Family of Block Ciphers.
Darmstadt, Technische Universität, [Bachelor Thesis]

Walter, Michael and Bulygin, Stanislav and Buchmann, Johannes Kutylowski, Miroslaw and Yung, Moti (eds.) (2012):
Optimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC.
In: Lecture Notes in Computer Science, 7763, In: The 8th China International Conference on Information Security and Cryptology (Inscrypt 2012), Springer, Beijing, China, pp. 175-197, ISBN 978-3-642-38518-6,
[Conference or Workshop Item]

This list was generated on Thu Dec 5 01:33:44 2019 CET.