Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,393,624 papers from all fields of science
Search
Sign In
Create Free Account
Route distinguisher
Known as:
Network address prefix
, Prefix (disambiguation)
, RD
Expand
A route distinguisher is an address qualifier used only within a single internet service provider's Multiprotocol Label Switching (MPLS) network. It…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
3 relations
Border Gateway Protocol
Multiprotocol Label Switching
Virtual private network
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2017
Highly Cited
2017
Automatic Search of Bit-Based Division Property for ARX Ciphers and Word-Based Division Property
Ling Sun
,
Wei Wang
,
Meiqin Wang
International Conference on the Theory and…
2017
Corpus ID: 131560
Division property is a generalized integral property proposed by Todo at Eurocrypt 2015. Previous tools for automatic searching…
Expand
Highly Cited
2015
Highly Cited
2015
Quantum Differential and Linear Cryptanalysis
M. Kaplan
,
G. Leurent
,
Anthony Leverrier
,
M. Naya-Plasencia
IACR Transactions on Symmetric Cryptology
2015
Corpus ID: 254252
Quantum computers, that may become available one day, would impact many scientific fields, most notably cryptography since many…
Expand
Highly Cited
2014
Highly Cited
2014
Differential-Linear Cryptanalysis Revisited
Céline Blondeau
,
G. Leander
,
K. Nyberg
Journal of Cryptology
2014
Corpus ID: 117755666
The two main classes of statistical cryptanalysis are the linear and differential attacks. They have many variants and…
Expand
Highly Cited
2010
Highly Cited
2010
The World is Not Enough: Another Look on Second-Order DPA
François-Xavier Standaert
,
Nicolas Veyrat-Charvillon
,
+4 authors
S. Mangard
IACR Cryptology ePrint Archive
2010
Corpus ID: 2020932
In a recent work, Mangard et al. showed that under certain assumptions, the (so-called) standard univariate side-channel attacks…
Expand
Highly Cited
2010
Highly Cited
2010
A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony
O. Dunkelman
,
Nathan Keller
,
A. Shamir
Journal of Cryptology
2010
Corpus ID: 9767064
Over the last 20 years, the privacy of most GSM phone conversations was protected by the A5/1 and A5/2 stream ciphers, which were…
Expand
Highly Cited
2010
Highly Cited
2010
Security Analysis of the Mode of JH Hash Function
Rishiraj Bhattacharyya
,
Avradip Mandal
,
M. Nandi
Fast Software Encryption Workshop
2010
Corpus ID: 9083545
Recently, NIST has selected 14 second round candidates of SHA3 competition. One of these candidates will win the competition and…
Expand
Highly Cited
2008
Highly Cited
2008
A Meet-in-the-Middle Attack on 8-Round AES
Hüseyin Demirci
,
A. Selçuk
Fast Software Encryption Workshop
2008
Corpus ID: 11495370
We present a 5-round distinguisher for AES. We exploit this distinguisher to develop a meet-in-the-middle attack on 7 rounds of…
Expand
Highly Cited
2007
Highly Cited
2007
Known-Key Distinguishers for Some Block Ciphers
L. Knudsen
,
V. Rijmen
International Conference on the Theory and…
2007
Corpus ID: 6115829
We present two block cipher distinguishers in a setting where the attacker knows the key. One is a distinguisher for AES reduced…
Expand
Highly Cited
2006
Highly Cited
2006
Improved Linear Distinguishers for SNOW 2.0
K. Nyberg
,
J. Wallén
Fast Software Encryption Workshop
2006
Corpus ID: 1023099
In this paper we present new and more accurate estimates of the biases of the linear approximation of the FSM of the stream…
Expand
Highly Cited
2002
Highly Cited
2002
New Results on Boomerang and Rectangle Attacks
E. Biham
,
O. Dunkelman
,
Nathan Keller
Fast Software Encryption Workshop
2002
Corpus ID: 14106193
The boomerang attack is a new and very powerful cryptanalytic technique. However, due to the adaptive chosen plaintext and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required