• McEliece

  • Referenced in 251 articles [sw02076]
  • Practical power analysis attacks on software implementations of McEliece. The McEliece public-key cryptosystem ... Therefore, their vulnerability and robustness against physical attacks, e.g., state-of-the-art power analysis ... attacks, must be investigated. In this work, we address mainly two power analysis attacks ... first time that such side-channel attacks are practically evaluated...
  • CSparse

  • Referenced in 237 articles [sw20382]
  • solution of sparse systems of linear equations. Attacking these problems efficiently requires an in-depth...
  • Casper

  • Referenced in 95 articles [sw06559]
  • used either to find attacks upon protocols, or to show that no such attack exists ... fake messages, but not perform any cryptological attacks...
  • GWO

  • Referenced in 104 articles [sw40816]
  • hunting, searching for prey, encircling prey, and attacking prey, are implemented. The algorithm is then...
  • KEM-DEM

  • Referenced in 59 articles [sw03093]
  • semantically secure against adaptively chosen ciphertext attacks (IND-CCA2) and DEM semantically secure against adaptively ... chosen plaintext/ciphertext attacks (IND-P2-C2) along with secure signatures and ideal certification authority...
  • HMQV

  • Referenced in 80 articles [sw02714]
  • that MQV fails to a variety of attacks in this model that invalidate its basic...
  • Trivium

  • Referenced in 79 articles [sw06150]
  • vulnerable to simple, and possibly devastating, attacks (which is why we strongly discourage...
  • Grain

  • Referenced in 73 articles [sw19539]
  • size is 80 bits and no attack faster than exhaustive key search has been identified...
  • Piccolo

  • Referenced in 52 articles [sw13242]
  • known analyses including recent related-key differential attacks and meet-in-the-middle attacks...
  • Serpent

  • Referenced in 50 articles [sw21989]
  • practical level of assurance that no shortcut attack will be found. To achieve this ... sufficient to block all currently known shortcut attacks. We believed this to be prudent practice...
  • PRINCE

  • Referenced in 69 articles [sw13240]
  • prove its soundness against generic attacks...
  • ProVerif

  • Referenced in 43 articles [sw06558]
  • means that the verifier can give false attacks, but if it claims that the protocol ... With Xavier Allamigeon, we have implemented attack reconstruction: when the tool cannot prove a property ... tries to reconstruct an attack, that is, an execution trace of the protocol that falsifies...
  • BKZ

  • Referenced in 66 articles [sw10242]
  • security against key-recovery lattice attacks, actually offers at most 65-bit security...
  • Square

  • Referenced in 63 articles [sw26286]
  • However, after the initial design a dedicated attack was mounted that forced us to augment...
  • LBlock

  • Referenced in 45 articles [sw06569]
  • achieve enough security margin against known attacks, such as differential cryptanalysis, linear cryptanalysis, impossible differential ... cryptanalysis and related-key attacks etc. Furthermore, LBlock can be implemented efficiently not only...
  • Maude-NPA

  • Referenced in 35 articles [sw12159]
  • like the original NPA, looks for attacks by searching backwards from an insecure attack state ... violate completeness, so that failure to find attacks still guarantees security. In this paper...
  • AFRA

  • Referenced in 29 articles [sw02090]
  • AFRA: argumentation framework with recursive attacks. The issue of representing attacks to attacks in argumentation ... present AFRA, a formalism encompassing unlimited recursive attacks within argumentation frameworks. AFRA satisfies the basic ... detailed comparison with other recursive attack formalizations...
  • MaLARea

  • Referenced in 50 articles [sw10278]
  • combine learning from previous experience to attack difficult unsolved problems. The first version of MaLARea...
  • StirMark

  • Referenced in 34 articles [sw19164]
  • Then several versions followed improving the original attack but also introducing a longer lists ... engine so you can code your own attacks. If you do so you can send...
  • FLASH

  • Referenced in 46 articles [sw02233]
  • proof of security, but the best known attacks require more than 2 80 computations...