-
McEliece
- Referenced in 251 articles
[sw02076]
- Practical power analysis attacks on software implementations of McEliece. The McEliece public-key cryptosystem ... Therefore, their vulnerability and robustness against physical attacks, e.g., state-of-the-art power analysis ... attacks, must be investigated. In this work, we address mainly two power analysis attacks ... first time that such side-channel attacks are practically evaluated...
-
CSparse
- Referenced in 237 articles
[sw20382]
- solution of sparse systems of linear equations. Attacking these problems efficiently requires an in-depth...
-
Casper
- Referenced in 95 articles
[sw06559]
- used either to find attacks upon protocols, or to show that no such attack exists ... fake messages, but not perform any cryptological attacks...
-
GWO
- Referenced in 104 articles
[sw40816]
- hunting, searching for prey, encircling prey, and attacking prey, are implemented. The algorithm is then...
-
KEM-DEM
- Referenced in 59 articles
[sw03093]
- semantically secure against adaptively chosen ciphertext attacks (IND-CCA2) and DEM semantically secure against adaptively ... chosen plaintext/ciphertext attacks (IND-P2-C2) along with secure signatures and ideal certification authority...
-
HMQV
- Referenced in 80 articles
[sw02714]
- that MQV fails to a variety of attacks in this model that invalidate its basic...
-
Trivium
- Referenced in 79 articles
[sw06150]
- vulnerable to simple, and possibly devastating, attacks (which is why we strongly discourage...
-
Grain
- Referenced in 73 articles
[sw19539]
- size is 80 bits and no attack faster than exhaustive key search has been identified...
-
Piccolo
- Referenced in 52 articles
[sw13242]
- known analyses including recent related-key differential attacks and meet-in-the-middle attacks...
-
Serpent
- Referenced in 50 articles
[sw21989]
- practical level of assurance that no shortcut attack will be found. To achieve this ... sufficient to block all currently known shortcut attacks. We believed this to be prudent practice...
-
PRINCE
- Referenced in 69 articles
[sw13240]
- prove its soundness against generic attacks...
-
ProVerif
- Referenced in 43 articles
[sw06558]
- means that the verifier can give false attacks, but if it claims that the protocol ... With Xavier Allamigeon, we have implemented attack reconstruction: when the tool cannot prove a property ... tries to reconstruct an attack, that is, an execution trace of the protocol that falsifies...
-
BKZ
- Referenced in 66 articles
[sw10242]
- security against key-recovery lattice attacks, actually offers at most 65-bit security...
-
Square
- Referenced in 63 articles
[sw26286]
- However, after the initial design a dedicated attack was mounted that forced us to augment...
-
LBlock
- Referenced in 45 articles
[sw06569]
- achieve enough security margin against known attacks, such as differential cryptanalysis, linear cryptanalysis, impossible differential ... cryptanalysis and related-key attacks etc. Furthermore, LBlock can be implemented efficiently not only...
-
Maude-NPA
- Referenced in 35 articles
[sw12159]
- like the original NPA, looks for attacks by searching backwards from an insecure attack state ... violate completeness, so that failure to find attacks still guarantees security. In this paper...
-
AFRA
- Referenced in 29 articles
[sw02090]
- AFRA: argumentation framework with recursive attacks. The issue of representing attacks to attacks in argumentation ... present AFRA, a formalism encompassing unlimited recursive attacks within argumentation frameworks. AFRA satisfies the basic ... detailed comparison with other recursive attack formalizations...
-
MaLARea
- Referenced in 50 articles
[sw10278]
- combine learning from previous experience to attack difficult unsolved problems. The first version of MaLARea...
-
StirMark
- Referenced in 34 articles
[sw19164]
- Then several versions followed improving the original attack but also introducing a longer lists ... engine so you can code your own attacks. If you do so you can send...
-
FLASH
- Referenced in 46 articles
[sw02233]
- proof of security, but the best known attacks require more than 2 80 computations...