related key attack
Related-Key Attack on Full-Round PICARO
17
Cryptanalysis Techniques for Stream Cipher: A Survey
5
Related-key Impossible Differential Analysis of Full Khudra
10
A Practical Related-Key Boomerang Attack for the Full MMB Block Cipher
21
Related-Key Rectangle Attack on Round-reduced \textit{Khudra} Block Cipher
13
Development and content validity testing of a patient-reported outcomes questionnaire for the assessment of hereditary angioedema in observational studies
15
Conditional beam-splitting attack on quantum key distribution
13
Security of the AES with a Secret S-box
15
An ID-Based Group Key Agreement Scheme for Controlling Access and Privacy in Cloud
7
A Polynomial-Time Key-Recovery Attack on MQQ Cryptosystems
19
From Related-Key Distinguishers to Related-Key-Recovery on Even-Mansour Constructions
12
Quantum Key-recovery Attack on Feistel Structures
8
Security Analysis and Improvements of a Three-Party Password-Based Key Exchange Protocol
7
Key Node Oriented Black Hole Attack and Detection
6
Threshold Cryptography Based Data Security in Cloud Computing
5
Password Authentication by graphical And Keylogging-Resistant Visual System
6
A Small Subgroup Attack for Recovering Ephemeral Keys in Chang and Chang Password Key Exchange Protocol
7
Avoiding Key Off Set attack in a Pairing Free Certificateless Key Agreement Protocol based on ECC
8
Cryptanalysis of the Double Moduli Cryptosystem
5
Related-Key Forgeries for Prst-OTR
16