Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
35
views
20
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,955
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part II
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
other
Author(s):
Christof Beierle
,
Patrick Derbez
,
Gregor Leander
,
Gaëtan Leurent
,
Håvard Raddum
,
Yann Rotella
,
David Rupprecht
,
Lukas Stennes
Publication date
(Online):
June 16 2021
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Computational Communication Research
Most cited references
20
Record
: found
Abstract
: not found
Article
: not found
OpenMP: an industry standard API for shared-memory programming
L. Dagum
,
Prema R Menon
(1998)
0
comments
Cited
290
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Boolean Functions for Cryptography and Error-Correcting Codes
Claude Carlet
,
Yves Crama
,
Peter L. Hammer
(2010)
0
comments
Cited
49
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
A $T = O(2^{n/2} )$, $S = O(2^{n/4} )$ Algorithm for Certain NP-Complete Problems
Richard Schroeppel
,
Adi Shamir
(1981)
0
comments
Cited
42
times
– based on
0
reviews
Review now
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2021
Publication date (Online):
June 16 2021
Pages
: 155-183
DOI:
10.1007/978-3-030-77886-6_6
SO-VID:
3d9d7c90-b687-4563-af92-c8a62cdb4f43
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
pp. 35
Mind the Middle Layer: The HADES Design Strategy Revisited
pp. 64
Password Hashing and Preprocessing
pp. 92
Compactness of Hashing Modes and Efficiency Beyond Merkle Tree
pp. 127
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
pp. 155
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
pp. 187
Pre-computation Scheme of Window \(\tau \)NAF for Koblitz Curves Revisited
pp. 219
Dummy Shuffling Against Algebraic Attacks in White-Box Implementations
pp. 249
Advanced Lattice Sieving on GPUs, with Tensor Cores
pp. 283
Fast Verification of Masking Schemes in Characteristic Two
pp. 313
On the Power of Expansion: More Efficient Constructions in the Random Probing Model
pp. 344
Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages
pp. 377
Leakage Resilient Value Comparison with Application to Message Authentication
pp. 408
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
pp. 438
Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
pp. 468
Multi-source Non-malleable Extractors and Applications
pp. 501
Secure Software Leasing
pp. 531
Oblivious Transfer Is in MiniQCrypt
pp. 562
Security Analysis of Quantum Lightning
pp. 568
Classical vs Quantum Random Oracles
pp. 598
On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work
pp. 630
Classical Proofs of Quantum Knowledge
pp. 663
Order-C Secure Multiparty Computation for Highly Repetitive Circuits
pp. 694
The More the Merrier: Reducing the Cost of Large Scale MPC
pp. 724
Multiparty Reusable Non-interactive Secure Computation from LWE
pp. 754
Unbounded Multi-party Computation from Learning with Errors
pp. 782
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
pp. 812
Constant-Overhead Unconditionally Secure Multiparty Computation Over Binary Fields
pp. 842
Breaking the Circuit Size Barrier for Secure Computation Under Quasi-Polynomial LPN
pp. 871
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
pp. 901
VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE
Similar content
4,955
Design of remote ecg monitoring system based on gprs
Authors:
K Zhang
,
L. SONG
,
D LU
GPRS/EGPRS standards applied to DTC of a DFIG using fuzzy – PI controllers
Authors:
C.E. Capovilla
,
Ivan R.S. Casella
,
J.S. Solís-Chaves
…
Anisotropic mechanical properties and strain tuneable band-gap in single-layer SiP, SiAs, GeP and GeAs
Authors:
Bohayra Mortazavi
,
Timon Rabczuk
See all similar