On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers | 0 | 0.34 | 2021 |
Cyber–physical attacks on power distribution systems | 0 | 0.34 | 2020 |
Privacy Preserving Netting Protocol for Inter-bank Payments. | 0 | 0.34 | 2020 |
On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T. | 0 | 0.34 | 2019 |
The Sorry State of TLS Security in Enterprise Interception Appliances | 0 | 0.34 | 2018 |
OpenStack-Based Evaluation Framework for Smart Grid Cyber Security | 1 | 0.38 | 2018 |
Smart But Unsafe: Experimental Evaluation of Security and Privacy Practices in Smart Toys. | 1 | 0.37 | 2018 |
Integral Attacks on Round-Reduced Bel-T-256. | 0 | 0.34 | 2018 |
Impossible Differential Attack On Reduced Round Sparx-128/256 | 0 | 0.34 | 2018 |
Related-Key Differential Attack On Round-Reduced Bel-T-256 | 0 | 0.34 | 2018 |
To Intercept or Not to Intercept: Analyzing TLS Interception in Network Appliances. | 0 | 0.34 | 2018 |
Uplink Coverage of Machine-Type Communications in Ultra-Dense Networks. | 0 | 0.34 | 2018 |
Fault analysis-resistant implementation of Rainbow Signature scheme | 0 | 0.34 | 2017 |
BinSequence: Fast, Accurate and Scalable Binary Code Reuse Detection. | 0 | 0.34 | 2017 |
Milp Modeling For (Large) S-Boxes To Optimize Probability Of Differential Characteristics | 1 | 0.43 | 2017 |
A power analysis resistant FPGA implementation of NTRUEncrypt | 0 | 0.34 | 2017 |
Coverage and Capacity Analysis with Stretched Exponential Path Loss in Ultra-Dense Networks. | 0 | 0.34 | 2017 |
A Meet-In-The-Middle Attack On Reduced-Round Kalyna-B/2b | 1 | 0.35 | 2016 |
Security Tradeoffs in Cyber Physical Systems: A Case Study Survey on Implantable Medical Devices. | 16 | 0.59 | 2016 |
Watch your constants: malicious Streebog. | 9 | 0.69 | 2015 |
A Higher Order Key Partitioning Attack With Application To Lblock | 0 | 0.34 | 2015 |
A Meet In The Middle Attack On Reduced Round Kuznyechik | 0 | 0.34 | 2015 |
Differential Fault Analysis Of Streebog | 4 | 0.43 | 2015 |
Fault Analysis of Kuznyechik. | 2 | 0.58 | 2015 |
Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3 | 3 | 0.39 | 2015 |
Impossible Differential Properties Of Reduced Round Streebog | 0 | 0.34 | 2015 |
Preimage Analysis of the Maelstrom-0 Hash Function. | 0 | 0.34 | 2015 |
Differential Sieving for 2-Step Matching Meet-in-the-Middle Attack with Application to LBlock. | 3 | 0.39 | 2014 |