Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

12 results
Keywords : cryptanalysis
Image document

Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks

Ekawat Homsirikamol , Paweł Morawiecki , Marcin Rogawski , Marian Srebrny
11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.56-67, ⟨10.1007/978-3-642-33260-9_4⟩
Conference papers hal-01551728v1
Image document

Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method

Xuyun Nie , Albrecht Petzoldt , Johannes Buchmann
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.91-104
Conference papers hal-01506559v1
Image document

Cryptanalysis of a SIP Authentication Scheme

Fuwen Liu , Hartmut Koenig
12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.134-143, ⟨10.1007/978-3-642-24712-5_11⟩
Conference papers hal-01596196v1
Image document

AES Variants Secure against Related-Key Differential and Boomerang Attacks

Jiali Choy , Aileen Zhang , Khoongming Khoo , Matt Henricksen , Axel Poschmann
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.191-207, ⟨10.1007/978-3-642-21040-2_13⟩
Conference papers hal-01573307v1
Image document

A Robust Remote User Authentication Scheme against Smart Card Security Breach

Chun-Ta Li , Cheng-Chi Lee , Chen-Ju Liu , Chin-Wen Lee
23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231-238, ⟨10.1007/978-3-642-22348-8_18⟩
Conference papers hal-01586587v1
Image document

On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing

Ruxandra F. Olimid
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.399-408, ⟨10.1007/978-3-642-36818-9_44⟩
Conference papers hal-01480199v1
Image document

Security Vulnerabilities of User Authentication Scheme Using Smart Card

Ravi Singh Pippal , Jaidhar C.D. , Shashikala Tapaswi
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.106-113, ⟨10.1007/978-3-642-31540-4_8⟩
Conference papers hal-01534770v1
Image document

Impossible Differential Cryptanalysis of Reduced-Round LBlock

Ferhat Karakoç , Hüseyin Demirci , A. Emre Harmanci
6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.179-188, ⟨10.1007/978-3-642-30955-7_16⟩
Conference papers hal-01534301v1
Image document

Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards

Ding Wang , Chun-Guang Ma , Peng Wu
26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.114-121, ⟨10.1007/978-3-642-31540-4_9⟩
Conference papers hal-01534767v1
Image document

Breaking a Robust Remote User Authentication Scheme Using Smart Cards

Ding Wang , Chun-Guang Ma , Sen-Dong Zhao , Chang-Li Zhou
9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.110-118, ⟨10.1007/978-3-642-35606-3_13⟩
Conference papers hal-01551357v1
Image document

Virtual Expansion of Rainbow Tables

Vrizlynn Thing
6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.243-256, ⟨10.1007/978-3-642-15506-2_17⟩
Conference papers hal-01060622v1
Image document

Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock

Jiageng Chen , Atsuko Miyaji
1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.1-15
Conference papers hal-01506560v1