Wouter Castryck, An efficient key recovery attack on supersingular isogeny Diffie-Hellman VaNTAGe 1:07:32 1 year ago 926 Далее Скачать
Dhiman Saha | Key Recovery Attack against 2 5 round $pi$ Cipher Horst Goertz Institute for IT Security 21:33 8 years ago 130 Далее Скачать
Leuven Isogeny Days 2022 "An efficient key recovery attack on SIDH" (Thomas Decru) COSIC - Computer Security and Industrial Cryptography 54:12 1 year ago 312 Далее Скачать
Key Recovery Attacks of Practical Complexity on AES Variants With Up To 10 Rounds Microsoft Research 1:11:29 8 years ago 2 089 Далее Скачать
A Key Recovery Attack on 27 Round SIMON 32 64 using Correlated Sequences IACR 3:00 5 years ago 184 Далее Скачать
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors IACR 22:50 7 years ago 286 Далее Скачать
11 - A Polynomial Time Key-recovery Attack on the Sidon Cryptosystem. Selected Areas in Cryptography 2021 19:02 2 years ago 93 Далее Скачать
Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unkno... IACR 24:14 3 years ago 847 Далее Скачать
Misuse-Free Key-Recovery and Distinguishing Attacks on 7-Round Ascon IACR 28:07 2 years ago 95 Далее Скачать
Improved Key Recovery Attacks on Reduced Round AES with Practical Data and Memory Complexities IACR 18:26 5 years ago 1 135 Далее Скачать
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm IACR 24:15 7 years ago 133 Далее Скачать
A key-recovery timing attack on post-quantum primitives using the Fujisaki-Okamoto transformati... IACR 24:56 4 years ago 670 Далее Скачать