Results 281 to 290 of about 10,030,622 (339)
Some of the next articles are maybe not open access.
Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks
IACR Cryptology ePrint Archive, 2023Tianrui Wang, A. Wang, Xiaoyun Wang
semanticscholar +1 more source
Efficient Key Recovery for All HFE Signature Variants
Annual International Cryptology Conference, 2021Chengdong Tao +2 more
semanticscholar +1 more source
Practical Key Recovery Schemes
2001In this paper,the Bell Labs key recovery scheme is extensively modified to enable a user to request on-line key recovery service when the file decryption key is forgotten or lost. New practical and important requirements of key recovery are also considered in the proposed schemes, for example, the key recovery server and any intruder over the ...
openaire +1 more source
Computers & Security, 2000
This document describes a mechanism for transmitting a key recovery header (KRH) within an IPSEC datagram. The KRH is normally inserted following the AH header and before the ESP header. The Key Recovery Header was designed to be compatible with IETF's IPSEC Architecture.
Tom Markham, Chuck Williams
openaire +1 more source
This document describes a mechanism for transmitting a key recovery header (KRH) within an IPSEC datagram. The KRH is normally inserted following the AH header and before the ESP header. The Key Recovery Header was designed to be compatible with IETF's IPSEC Architecture.
Tom Markham, Chuck Williams
openaire +1 more source
A New Key Recovery Side-Channel Attack on HQC with Chosen Ciphertext
Post-Quantum Cryptography, 2022Guillaume Goy +2 more
semanticscholar +1 more source
Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks
Annual International Cryptology Conference, 2021Xiaoyang Dong +5 more
semanticscholar +1 more source
Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery
IACR Cryptology ePrint Archive, 2022Ling Song +6 more
semanticscholar +1 more source
2017
At PQCRYPTO 2014, Porras, Baena and Ding introduced ZHFE, an interesting new technique for multivariate post-quantum encryption. The scheme is a generalization of HFE in which a single low degree polynomial in the central map is replaced by a pair of high degree polynomials with a low degree cubic polynomial contained in the ideal they generate.
Daniel Cabarcas +2 more
openaire +1 more source
At PQCRYPTO 2014, Porras, Baena and Ding introduced ZHFE, an interesting new technique for multivariate post-quantum encryption. The scheme is a generalization of HFE in which a single low degree polynomial in the central map is replaced by a pair of high degree polynomials with a low degree cubic polynomial contained in the ideal they generate.
Daniel Cabarcas +2 more
openaire +1 more source
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V
IACR Cryptology ePrint Archive, 2022Jin Hoki +4 more
semanticscholar +1 more source

