61
Published 2020
Springer International Publishing
Table of Contents: ... against Rushing Adversaries -- Cryptanalysis -- Cryptanalytic Extraction of Neural Network Models...

62
Published 2015
Springer Berlin Heidelberg
Table of Contents: ...Cryptanalysis of the Multilinear Map over the Integers -- Robust Authenticated-Encryption AEZ...

63
Published 2024
Springer Nature Switzerland
Table of Contents: ...Cryptanalysis of Lightweight Ciphers -- More Balanced Polynomials: Cube Attacks on 810- and 825...

64
Published 1997
Springer Berlin Heidelberg
Table of Contents: ...?2 cryptanalysis of the SEAL encryption algorithm -- Partitioning cryptanalysis...

65
Published 2014
Springer Berlin Heidelberg
Table of Contents: ...Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side...

66
Published 2014
Springer Berlin Heidelberg
Table of Contents: ...Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side...

67
Published 2015
Springer Berlin Heidelberg
Table of Contents: ... and IO -- Pseudorandomness -- Block cipher cryptanalysis -- Integrity -- Assumptions -- Hash functions...

68
Published 2015
Springer Berlin Heidelberg
Table of Contents: ... and IO -- Pseudorandomness -- Block cipher cryptanalysis -- Integrity -- Assumptions -- Hash functions...

69
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... Cryptanalysis of RC5 and RC6 -- A Revised Version of CRYPTON: CRYPTON V1.0 -- Attack on Six Rounds of CRYPTON...

70
Published 2023
Springer Nature Singapore
Table of Contents: ...Cryptanalysis of post-quantum and public-key systems -- side-channels -- quantum random oracle...

71
Published 2012
Springer Berlin Heidelberg
... from 92 submissions. The papers are organized in topical sections on cryptanalysis of hash functions...

72
Published 1998
Springer Berlin Heidelberg
Table of Contents: ... -- Differential collisions in SHA-0 -- From differential cryptanalysis to ciphertext-only attacks -- A simplified...

73
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... -- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms -- Cryptanalysis of the GOST Hash...

74
Published 2016
Springer Berlin Heidelberg
Table of Contents: ...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis...

75
Published 2016
Springer Berlin Heidelberg
Table of Contents: ...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis...

76
Published 2016
Springer Berlin Heidelberg
Table of Contents: ...Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis...

77
Published 2004
Springer Berlin Heidelberg
Table of Contents: ... -- Cryptanalysis I -- A New Meet-in-the-Middle Attack on the IDEA Block Cipher -- Cryptanalysis of the Alleged...

78
Published 2021
Springer International Publishing
Table of Contents: ... Cryptanalysis -- Classical Attacks on a Variant of the RSA Cryptosystem -- Improved attacks against key reuse...

79
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... Equation (HOLE) Attack on Multivariate Public Key Cryptosystems -- Cryptanalysis of HFE with Internal...

80
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... -- Cryptographic Hash Functions: Theory and Practice -- Hash Functions -- Cryptanalysis of Tav-128 Hash Function --...