Results 281 to 290 of about 10,030,622 (339)
Some of the next articles are maybe not open access.

Exploring Decryption Failures of BIKE: New Class of Weak Keys and Key Recovery Attacks

IACR Cryptology ePrint Archive, 2023
Tianrui Wang, A. Wang, Xiaoyun Wang
semanticscholar   +1 more source

Efficient Key Recovery for All HFE Signature Variants

Annual International Cryptology Conference, 2021
Chengdong Tao   +2 more
semanticscholar   +1 more source

Practical Key Recovery Schemes

2001
In this paper,the Bell Labs key recovery scheme is extensively modified to enable a user to request on-line key recovery service when the file decryption key is forgotten or lost. New practical and important requirements of key recovery are also considered in the proposed schemes, for example, the key recovery server and any intruder over the ...
openaire   +1 more source

Key Recovery Header for IPSEC

Computers & Security, 2000
This document describes a mechanism for transmitting a key recovery header (KRH) within an IPSEC datagram. The KRH is normally inserted following the AH header and before the ESP header. The Key Recovery Header was designed to be compatible with IETF's IPSEC Architecture.
Tom Markham, Chuck Williams
openaire   +1 more source

A New Key Recovery Side-Channel Attack on HQC with Chosen Ciphertext

Post-Quantum Cryptography, 2022
Guillaume Goy   +2 more
semanticscholar   +1 more source

Meet-in-the-Middle Attacks Revisited: Key-Recovery, Collision, and Preimage Attacks

Annual International Cryptology Conference, 2021
Xiaoyang Dong   +5 more
semanticscholar   +1 more source

Optimizing Rectangle Attacks: A Unified and Generic Framework for Key Recovery

IACR Cryptology ePrint Archive, 2022
Ling Song   +6 more
semanticscholar   +1 more source

Key Recovery Attack for ZHFE

2017
At PQCRYPTO 2014, Porras, Baena and Ding introduced ZHFE, an interesting new technique for multivariate post-quantum encryption. The scheme is a generalization of HFE in which a single low degree polynomial in the central map is replaced by a pair of high degree polynomials with a low degree cubic polynomial contained in the ideal they generate.
Daniel Cabarcas   +2 more
openaire   +1 more source

Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V

IACR Cryptology ePrint Archive, 2022
Jin Hoki   +4 more
semanticscholar   +1 more source

Enterprise Key Recovery

Informatik-Spektrum, 1999
Hartmut Pohl, Dietrich Cerny
openaire   +1 more source

Home - About - Disclaimer - Privacy