-
1Academic Journal
المؤلفون: Lin Ding, Zhiyi Liao, Zhengting Li, Zheng Wu, Xinhai Wang, Ziyu Guan
المصدر: Heliyon, Vol 10, Iss 2, Pp e24197- (2024)
مصطلحات موضوعية: Cryptanalysis, Slide attack, WG-5, Stream cipher, Lightweight cryptography, Science (General), Q1-390, Social sciences (General), H1-99
وصف الملف: electronic resource
-
2Academic Journal
المؤلفون: Hisanobu TAWARA, Kengo MINOWA, Kouichiro IMAMARU, Takayuki MINOWA, 今丸 好一郎, 俵 尚申, 箕輪 憲吾, 蓑輪 貴幸
المصدر: バレーボール研究 / Journal of Volleyball Sciences. 2022, 24(1):35
-
3
المصدر: 名古屋学院大学論集 医学・健康科学・スポーツ科学篇 = THE NAGOYA GAKUIN DAIGAKU RONSHU; Journal of Nagoya Gakuin University; MEDICAL, HEALTH, and SPORTS SCIENCES. 10(1):13-23
مصطلحات موضوعية: slide attack, Vリーグ, volleyball, バレーボール, V. league, ブロード攻撃, game analysis, ゲーム分析
-
4Conference
المساهمون: Laboratoire Traitement et Communication de l'Information (LTCI), Télécom ParisTech-Institut Mines-Télécom Paris (IMT)-Centre National de la Recherche Scientifique (CNRS), Security, Cryptology and Transmissions (SECRET), Inria de Paris, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Matthew Robshaw, Jonathan Katz
المصدر: Crypto 2016 - 36th Annual International Cryptology Conference ; https://hal.inria.fr/hal-01404196 ; Crypto 2016 - 36th Annual International Cryptology Conference, Aug 2016, Santa Barbara, United States. pp.207-237, ⟨10.1007/978-3-662-53008-5_8⟩ ; https://www.iacr.org/conferences/crypto2016/
مصطلحات موضوعية: slide attack, post-quantum cryptography, symmetric cryptography, quantum attacks, block ciphers, modes of operation, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [PHYS.QPHY]Physics [physics]/Quantum Physics [quant-ph]
جغرافية الموضوع: Santa Barbara, United States
Relation: info:eu-repo/semantics/altIdentifier/arxiv/1602.05973; hal-01404196; https://hal.inria.fr/hal-01404196; https://hal.inria.fr/hal-01404196/document; https://hal.inria.fr/hal-01404196/file/Simon_CR16.pdf; ARXIV: 1602.05973
-
5Book
المؤلفون: Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, Wong, Kenneth
المساهمون: Daras, N J, Rassias, M T
المصدر: Computation, cryptography, and network security
مصطلحات موضوعية: A5/1, Initialisation, Slid pairs, Slide attack, State convergence, Stream cipher, Synchronisation attack
وصف الملف: application/pdf
Relation: https://eprints.qut.edu.au/92746/1/Springer.pdf; https://rdcu.be/djIpc; Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth (2015) Flaws in the initialisation process of stream ciphers. In Daras, N J & Rassias, M T (Eds.) Computation, cryptography, and network security. Springer, Switzerland, pp. 19-49.; https://eprints.qut.edu.au/92746/; Institute for Future Environments; Science & Engineering Faculty
الاتاحة: https://eprints.qut.edu.au/92746/
-
6
المؤلفون: Akhmedov B.B
المصدر: International Journal of Advanced Trends in Computer Science and Engineering. 9:1207-1211
مصطلحات موضوعية: GOST (hash function), Computer science, business.industry, Computer Science (miscellaneous), Electrical and Electronic Engineering, Slide attack, Encryption, business, Algorithm
-
7Book
المؤلفون: Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, Wong, Kenneth
المساهمون: Wysocki, B J, Wysocki, T A
المصدر: Proceedings of the 6th International Conference on Signal Processing and Communication Systems
مصطلحات موضوعية: Initialisation process, Sfinks, Slid pairs, Slid resynchronisation, Slide attack, Stream cipher
وصف الملف: application/pdf
Relation: https://eprints.qut.edu.au/57427/1/a13-alhamdan.pdf; Al Hamdan, Ali, Bartlett, Harry, Dawson, Ed, Simpson, Leonie, & Wong, Kenneth (2012) Slide attacks on the Sfinks stream cipher. In Wysocki, B J & Wysocki, T A (Eds.) Proceedings of the 6th International Conference on Signal Processing and Communication Systems. Institute of Electrical and Electronics Engineers Inc., United States, pp. 1-10.; https://eprints.qut.edu.au/57427/; Institute for Future Environments; Science & Engineering Faculty
الاتاحة: https://eprints.qut.edu.au/57427/
-
8
المؤلفون: Linhong Xu, Mingming Li, Jiansheng Guo, Jingyi Cui
المصدر: Tsinghua Science and Technology. 24:585-595
مصطلحات موضوعية: Key-recovery attack, Post-quantum cryptography, Security analysis, Multidisciplinary, Theoretical computer science, Computer science, business.industry, 020206 networking & telecommunications, Cryptography, 02 engineering and technology, 020202 computer hardware & architecture, law.invention, law, Computer Science::Multimedia, 0202 electrical engineering, electronic engineering, information engineering, Slide attack, Cryptanalysis, business, Computer Science::Cryptography and Security, Quantum computer, Block cipher
-
9Report
المؤلفون: Stefanovic, Tina, Zamporri, Jacopo, Aguinaldo, Arnel L
المصدر: ISBS Proceedings Archive
مصطلحات موضوعية: slide attack, kinematics, spike, velocity, performance, Athletics
وصف الملف: application/pdf
Relation: https://commons.nmu.edu/isbs/vol40/iss1/161; https://commons.nmu.edu/cgi/viewcontent.cgi?article=2398&context=isbs
-
10Report
مصطلحات موضوعية: バレーボール, ゲーム分析, ブロード攻撃, Vリーグ, volleyball, game analysis, slide attack, V. league
Relation: https://ngu.repo.nii.ac.jp/?action=repository_uri&item_id=1441; http://id.nii.ac.jp/1083/00001391/; 名古屋学院大学論集 医学・健康科学・スポーツ科学篇 = THE NAGOYA GAKUIN DAIGAKU RONSHU; Journal of Nagoya Gakuin University; MEDICAL, HEALTH, and SPORTS SCIENCES, 10(1), 13-23(2022-03-16); https://ngu.repo.nii.ac.jp/?action=repository_action_common_download&item_id=1441&item_no=1&attribute_id=22&file_no=1
-
11Academic Journal
المؤلفون: Ar Kircanski, Yanzhao Shen, Gaoli Wang, Amr M. Youssef
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Cryptanalysis, Boomerang attack, Rotational attack, Slide attack, SM3
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.301.9519; http://users.encs.concordia.ca/~a_kircan/sm3.pdf
-
12Report
المؤلفون: Bhaumik, Ritam, Dutta, Avijit, Guo, Jian, Jean, Jérémy, Mouha, Nicky, Nikolić, Ivica
المساهمون: Indian Statistical Institute Kolkata, Nanyang Technological University Singapour, Computer Security and Industrial Cryptography KU Leuven (ESAT-COSIC), Department of Electrical Engineering KU Leuven (KU-ESAT), Catholic University of Leuven = Katholieke Universiteit Leuven (KU Leuven)-Catholic University of Leuven = Katholieke Universiteit Leuven (KU Leuven), Security, Cryptology and Transmissions (SECRET), Inria Paris-Rocquencourt, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria), Inria Paris Rocquencourt, ANR-11-INSE-0011,BLOC,Conception et analyse de chiffrements par blocs(2011)
المصدر: https://inria.hal.science/hal-01241075 ; [Research Report] Inria Paris Rocquencourt. 2015.
مصطلحات موضوعية: Iterated cipher, fixed points, slide attack, PRIDE, Chaskey, PKCS, PBKDF1, Unix password hashing algorithm, Even-Mansour, FX-construction, [INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR], [INFO]Computer Science [cs]
Relation: hal-01241075; https://inria.hal.science/hal-01241075; https://inria.hal.science/hal-01241075/document; https://inria.hal.science/hal-01241075/file/484.pdf
-
13Academic Journal
المؤلفون: Jongsung Kim, Changhoon Lee, Seokhie Hong
المساهمون: The Pennsylvania State University CiteSeerX Archives
مصطلحات موضوعية: Block Cipher, Related-Cipher Attack, Related-Key Attack, Slide Attack, Differential Cryptanalysis, ARIA, SC2000
وصف الملف: application/pdf
Relation: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.521.3350; http://subs.emis.de/LNI/Proceedings/Proceedings74/GI-Edition74.-7.pdf
-
14Academic Journal
المؤلفون: Fúster Sabater, Amparo
مصطلحات موضوعية: Criptoanálisis, Criptosistemas, Edit-distance generalizada, Slide attack, Software criptográfico, Cifrado en flujo, Cifrado en bloque, Criptografía de clave pública
وصف الملف: 22615 bytes; application/pdf
Relation: http://www.uv.es/mat.es2005/Cripto/; Congreso MAT.ES 2005, Sesión Especial: "Tendencias actuales en la Criptología"; http://hdl.handle.net/10261/11279
الاتاحة: http://hdl.handle.net/10261/11279
-
15
المؤلفون: Tian Tian, Dong Yang, Wen-Feng Qi
المصدر: IET Information Security. 11:230-234
مصطلحات موضوعية: Differential cryptanalysis, Computer Networks and Communications, Stream cipher attack, 020206 networking & telecommunications, 02 engineering and technology, Cipher, Linear cryptanalysis, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Arithmetic, Slide attack, Key schedule, Block size, Software, Information Systems, Mathematics, Block cipher
-
16
المؤلفون: Victor Ruzhentsev, Yurii Onishchenko
المصدر: Eastern-European Journal of Enterprise Technologies. 4:28-33
مصطلحات موضوعية: S-box, Differential cryptanalysis, Applied Mathematics, Mechanical Engineering, T-function, 0211 other engineering and technologies, Energy Engineering and Power Technology, 020207 software engineering, 02 engineering and technology, Impossible differential cryptanalysis, Industrial and Manufacturing Engineering, Computer Science Applications, Control and Systems Engineering, Management of Technology and Innovation, 021105 building & construction, 0202 electrical engineering, electronic engineering, information engineering, Interpolation attack, Electrical and Electronic Engineering, Arithmetic, Slide attack, Block size, Algorithm, Key schedule, Mathematics
-
17
المؤلفون: Meiqin Wang, Long Wen, Huaifeng Chen, Tingting Cui
المصدر: Cryptography and Communications. 10:195-209
مصطلحات موضوعية: Key-recovery attack, Theoretical computer science, Computer Networks and Communications, Applied Mathematics, 020206 networking & telecommunications, Plaintext, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, law.invention, Computational Theory and Mathematics, 010201 computation theory & mathematics, law, 0202 electrical engineering, electronic engineering, information engineering, Interpolation attack, Integral cryptanalysis, Slide attack, Cryptanalysis, Ciphertext-only attack, Mathematics, Block cipher
-
18
المؤلفون: Zhen Ma, Tian Tian, Wen-Feng Qi
المصدر: IET Information Security. 11:139-145
مصطلحات موضوعية: 021110 strategic, defence & security studies, Computer Networks and Communications, Computer science, Stream cipher attack, 0211 other engineering and technologies, 02 engineering and technology, Birthday attack, Computer security, computer.software_genre, 020202 computer hardware & architecture, Pre-play attack, 0202 electrical engineering, electronic engineering, information engineering, Fluhrer, Mantin and Shamir attack, Chosen-ciphertext attack, Slide attack, Ciphertext-only attack, computer, Distinguishing attack, Software, Information Systems
-
19
المؤلفون: Wenling Wu, Li Lin
المصدر: Designs, Codes and Cryptography. 86:721-741
مصطلحات موضوعية: business.industry, Applied Mathematics, 020206 networking & telecommunications, Cryptography, Plaintext, 02 engineering and technology, Encryption, Computer Science Applications, Watermarking attack, 0202 electrical engineering, electronic engineering, information engineering, 020201 artificial intelligence & image processing, Meet-in-the-middle attack, Slide attack, Arithmetic, business, Ciphertext-only attack, Algorithm, Mathematics, Block cipher
-
20
المؤلفون: Adi Shamir, Orr Dunkelman, Noam Lasry, Nathan Keller
المصدر: Advances in Cryptology – EUROCRYPT 2020 ISBN: 9783030457204
EUROCRYPT (1)مصطلحات موضوعية: Self-similarity, Computer science, 0102 computer and information sciences, 02 engineering and technology, 01 natural sciences, GOST (block cipher), 010201 computation theory & mathematics, Iterated function, 0202 electrical engineering, electronic engineering, information engineering, Cryptosystem, 020201 artificial intelligence & image processing, Slide attack, Arithmetic, Block cipher