Skip to search formSkip to main contentSkip to account menu

Key-recovery attack

Known as: Key recovery attack 
A key-recovery attack is an adversary's attempt to recover the cryptographic key of an encryption scheme. Historically, cryptanalysis of block… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
We present a polynomial time attack of a rank metric code based encryption scheme due to Loidreau for some parameters. 
2009
2009
In this note, we present a full key recovery attack on HMACAURORA-512 when 512-bit secret keys are used and the MAC length is 512… 
2009
2009
Edon-R is one of the fastest SHA-3 candidate. In this paper we study the security of Edon-R, and we show that using Edon-R as a… 
2009
2009
In this paper, we propose an effective key recovery attack on stream ciphers Py and Pypy with chosen IVs. Our method uses an… 
2007
2007
In this talk we consider linear approximations of layered cipher constructions with secret key-dependent constants that are… 
2006
2006
Grain and Trivium are two hardware oriented synchronous stream ciphers proposed as the simplest candidates to the ECRYPT Stream… 
2006
2006
The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over the air communication. While… 
2005
2005
In this paper new “partial” key recovery attacks against the RMAC block cipher based Message Authentication Code scheme are… 
2004
2004
In 1985 Siegenthaler introduced the concept of correlation attacks on LFSR based stream ciphers. A few years later Meier and… 
2000
2000
We describe a series of new attacks on a CBC-MAC algorithm due to Knudsen and Preneel including two key recovery attacks and a…