The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for CBC with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1991-1997 (16) 1998-2000 (18) 2001-2002 (26) 2003 (17) 2004-2005 (33) 2006 (17) 2007-2008 (33) 2009-2010 (15) 2011-2014 (17) 2015-2016 (19) 2017-2019 (22) 2020-2021 (16) 2022-2023 (17) 2024 (1)
Publication types (Num. hits)
article(89) incollection(2) inproceedings(174) phdthesis(1) proceedings(1)
Venues (Conferences, Journals, ...)
IACR Cryptol. ePrint Arch.(22) CRYPTO(16) FSE(14) CoRR(10) CBC(9) EUROCRYPT(9) RFC(8) ACISP(6) J. Cryptol.(6) ICISC(4) INDOCRYPT(4) ASIACRYPT(3) CT-RSA(3) Selected Areas in Cryptography(3) ASP-DAC(2) CHES(2) More (+10 of total 148)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 197 occurrences of 114 keywords

Results
Found 267 publication records. Showing 267 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
110Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu Distinguishing and Second-Preimage Attacks on CBC-Like MACs. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CBC, MAC, Distinguishing attack, Second preimage attack
109Mridul Nandi Fast and Secure CBC-Type MAC Algorithms. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF OMAC, padding rule, prf-security, CBC-MAC
104Fengtong Wen, Wenling Wu, Qiaoyan Wen Error Oracle Attacks on Several Modes of Operation. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
83John Black, Phillip Rogaway CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Standards, Provable security, Message authentication codes, Modes of operation, CBC MAC
83Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF padding oracle, CBC-mode, side channel, ISO standards
83Kenneth G. Paterson, Arnold K. L. Yau Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF padding oracle attack, CBC-mode encryption, ISO standard
83Chris J. Mitchell Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
78Deng-Yiv Chiu, Kong-Ling Hsieh A Hybrid Incremental Clustering Method-Combining Support Vector Machine and Enhanced Clustering by Committee Clustering Algorithm. Search on Bibsonomy PAKDD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
74Kenneth G. Paterson, Gaven J. Watson Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
74Mihir Bellare, Krzysztof Pietrzak, Phillip Rogaway Improved Security Analyses for CBC MACs. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
74Éliane Jaulmes, Antoine Joux, Frédéric Valette On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
65Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya A New Mode of Operation for Block Ciphers and Length-Preserving MACs. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
62Dan Boneh, Richard A. DeMillo, Richard J. Lipton On the Importance of Eliminating Errors in Cryptographic Computations. Search on Bibsonomy J. Cryptol. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Standards, Provable security, Message authentication codes, Modes of operation, CBC MAC
61Richard M. Dansereau, S. Jin, Rafik A. Goubran Reducing Packet Loss in CBC Secured VoIP using Interleaved Encryption. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
61Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures. Search on Bibsonomy PPDP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF resolution strategies, verification, cryptographic protocols, horn clauses
61John Black, Phillip Rogaway CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
58Kaoru Kurosawa, Tetsu Iwata TMAC: Two-Key CBC MAC. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block cipher, provable security, CBC MAC
57Marco Baldi, Edoardo Persichetti, Paolo Santini (eds.) Code-Based Cryptography - 7th International Workshop, CBC 2019, Darmstadt, Germany, May 18-19, 2019, Revised Selected Papers Search on Bibsonomy CBC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
57Antonio Guimarães, Edson Borin, Diego de Freitas Aranha Introducing Arithmetic Failures to Accelerate QC-MDPC Code-Based Cryptography. Search on Bibsonomy CBC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
57Magali Bardet, Manon Bertin, Alain Couvreur, Ayoub Otmani Practical Algebraic Attack on DAGS. Search on Bibsonomy CBC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
57Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi, Paolo Santini LEDAcrypt: QC-LDPC Code-Based Cryptosystems with Bounded Decryption Failure Rate. Search on Bibsonomy CBC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
57Gretchen L. Matthews, Yongge Wang Quantum Resistant Public Key Encryption Scheme HermitianRLCE. Search on Bibsonomy CBC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
57Gustavo Banegas, Paulo S. L. M. Barreto, Brice Odilon Boidje, Pierre-Louis Cayrel, Gilbert Ndollane Dione, Kris Gaj, Cheikh Thiécoumba Gueye, Richard Haeussler, Jean Belo Klamti, Ousmane Ndiaye, Duc Tri Nguyen, Edoardo Persichetti, Jefferson E. Ricardini DAGS: Reloaded Revisiting Dyadic Key Encapsulation. Search on Bibsonomy CBC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
57Thomas Jerkovits, Hannes Bartz Weak Keys in the Faure-Loidreau Cryptosystem. Search on Bibsonomy CBC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
57Paolo Santini, Massimo Battaglioni, Franco Chiaraluce, Marco Baldi Analysis of Reaction and Timing Attacks Against Cryptosystems Based on Sparse Parity-Check Codes. Search on Bibsonomy CBC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
57Franz Aguirre Farro, Kirill Morozov On IND-CCA1 Security of Randomized McEliece Encryption in the Standard Model. Search on Bibsonomy CBC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
52Mridul Nandi A Simple and Unified Method of Proving Indistinguishability. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Praveen Dongara, T. N. Vijaykumar Accelerating private-key cryptography via multithreading on symmetric multiprocessors. Search on Bibsonomy ISPASS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
49Jaechul Sung, Deukjo Hong, Sangjin Lee 0002 Key Recovery Attacks on the RMAC, TMAC, and IACBC. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF RMAC, TMAC, XCBC, IACBC, Message Authentication Codes, Modes of Operation, Key Recovery Attacks, CBC-MAC
49Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell Key Recovery and Forgery Attacks on the MacDES MAC Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Cryptanalysis, Message Authentication Codes, CBC-MAC
48Weimin Li, Liangxu Liu, Jiajin Le Clustering Streaming Time Series Using CBC. Search on Bibsonomy International Conference on Computational Science (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
48Hua-Jun Zeng, Xuanhui Wang, Zheng Chen 0001, Hongjun Lu, Wei-Ying Ma CBC: Clustering Based Text Classification Requiring Minimal Labeled Data. Search on Bibsonomy ICDM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
48Jakob Jonsson On the Security of CTR + CBC-MAC. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF AES, modes of operation, authenticated encryption
48Karl Brincat, Chris J. Mitchell New CBC-MAC Forgery Attacks. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
44Robert W. Baldwin, Ronald L. Rivest The RC5, RC5-CBC, RC5-CBC-Pad, and RC5-CTS Algorithms. Search on Bibsonomy RFC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
39Kan Yasuda A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF imbalanced cipher block chaining, iCBC, MAC, privacy-preserving, message authentication code, domain extension
39Danilo Gligoroski, Suzana Andova, Svein J. Knapskog On the Importance of the Key Separation Principle for Different Modes of Operation. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF quasigroup string transformations, block ciphers, modes of operation
39Goce Jakimoski, K. P. Subbalakshmi On Efficient Message Authentication Via Block Cipher Design Techniques. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wegman-Carter construction, maximum differential probability, block ciphers, Message authentication, universal hash functions
39Eréndira Rendón, José Salvador Sánchez 0001 Clustering Based on Compressed Data for Categorical and Mixed Attributes. Search on Bibsonomy SSPR/SPR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
39Yuliang Zheng 0001, Yongge Wang Efficient and provably secure ciphers for storage device block level encryption. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF storage device encryption, hash function, symmetric cipher
39Prashant Saxena, Noel Menezes, Pasquale Cocchini, Desmond Kirkpatrick The scaling challenge: can correct-by-construction design help? Search on Bibsonomy ISPD The full citation details ... 2003 DBLP  DOI  BibTeX  RDF clocked repeaters, correct-by-construction design, design fabrics, post-RTL design, routing, interconnect, placement, logic synthesis, scaling, technology mapping, repeaters
39Ivan Damgård, Jesper Buus Nielsen Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
39Soichi Furuya, Kouichi Sakurai Risks with Raw-Key Masking - The Security Evaluation of 2-Key XCBC. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MAC, Block cipher, provable security, mode of operation
39Charanjit S. Jutla Encryption Modes with Almost Free Message Integrity. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
37Karin Teichmann, Andreas H. Zins Information Elements on DMO-Websites: Alternative Approaches for Measuring Perceived Utility. Search on Bibsonomy ENTER The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ACA, CBC, MaxDiff, CTO web sites, ranking, rating, destination
37Mridul Nandi Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF online cipher, CBC, universal hash function, random permutation
36Pierre-Alain Fouque, Gwenaëlle Martinet, Frédéric Valette, Sébastien Zimmer On the Security of the CCM Encryption Mode and of a Slight Variant. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CCM, CBC-MAC, Counter mode
36Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002 Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MAC (Message Authentication Code), PMAC, TMAC Variant, Key Recovery Attacks, CBC-MAC, Forgery Attacks
36Mihir Bellare, Phillip Rogaway, David A. Wagner 0001 The EAX Mode of Operation. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF EAX, OMAC, provable security, message authentication, modes of operation, Authenticated encryption, CCM, CBC MAC
36Ueli M. Maurer Indistinguishability of Random Systems. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF random systems, quasi-randomness, Indistinguishability, pseudo-random functions, CBC-MAC, pseudo-random permutations
35Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
35Tetsu Iwata, Kaoru Kurosawa OMAC: One-Key CBC MAC. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
35Serge Vaudenay Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
35Mihir Bellare, Alexandra Boldyreva, Lars R. Knudsen, Chanathip Namprempre Online Ciphers and the Hash-CBC Construction. Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
35Serge Vaudenay Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Guangqing Liu, Byungwook Lee A color-based clustering approach for web image search results. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF I-CDE, cluster, CBIR, vector space model, web image search
26Shay Gueron Intel's New AES Instructions for Enhanced Performance and Security. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF new instructions set, computer architecture, Advanced Encryption Standard
26Charanjit S. Jutla Encryption Modes with Almost Free Message Integrity. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pairwise independent, Parallelizable, Authentication, Encryption, Block ciphers
26Ian Sommerville Construction by Configuration: Challenges for Software Engineering Research and Practice. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ERP, COTS, research challenges
26Noriko Tomuro, Steven L. Lytinen, Kyoko Kanzaki, Hitoshi Isahara Clustering Using Feature Domain Similarity to Discover Word Senses for Adjectives. Search on Bibsonomy ICSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Reouven Elbaz, Lionel Torres, Gilles Sassatelli, Pierre Guillemin, Michel Bardouillet, Albert Martinez A Comparison of Two Approaches Providing Data Encryption and Authentication on a Processor Memory Bus. Search on Bibsonomy PATMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Youtao Zhang, Lan Gao, Jun Yang 0002, Xiangyu Zhang 0001, Rajiv Gupta 0001 SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors. Search on Bibsonomy HPCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Sumio Morioka, Akashi Satoh A 10-Gbps full-AES crypto design with a twisted BDD S-Box architecture. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Pierre-Alain Fouque, Antoine Joux, Gwenaëlle Martinet, Frédéric Valette Authenticated On-Line Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF blockwise adversaries, provable security, authenticated encryption, Symmetric encryption, chosen ciphertext attacks
26Shai Halevi, Phillip Rogaway A Tweakable Enciphering Mode. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Patrick Pantel, Dekang Lin Discovering word senses from text. Search on Bibsonomy KDD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF word sense discovery, clustering, machine learning, evaluation
26Sumio Morioka, Akashi Satoh A 10 Gbps Full-AES Crypto Design with a Twisted-BDD S-Box Architecture. Search on Bibsonomy ICCD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Qiming Chen, Umeshwar Dayal, Meichun Hsu Conceptual Modeling for Collaborative E-business Processes. Search on Bibsonomy ER The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Eli Biham Cryptanalysis of Multiple Modes of Operation. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Block ciphers, Block ciphers, Modes of operation, Modes of operation, Key words, Multiple modes, Multiple modes
26Mariusz H. Jakubowski, Ramarathnam Venkatesan The Chain & Sum Primitive and Its Applications to MACs and Stream Ciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Eli Biham Cryptanalysis of Multiple Modes of Operation. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
26Mihir Bellare, Joe Kilian, Phillip Rogaway The Security of Cipher Block Chaining. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
26Datong Chen, Satoshi Sugino, Zhiping Yu, Robert W. Dutton Modeling of the charge balance condition on floating gates and simulation of EEPROMs. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
24Gregory V. Bard Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Modes of Encryption, Blockwise-Adaptive Chosen-Plaintext Attack, BACPA, MACPA, Online-ness, CBC, CTR, OFB, CFB, IGE, HCBC, HPCBC, XCBC, ABC, ECB
23Piyush Kumar Shukla, Sanjay Silakari, Sarita Singh Bhadoriya Network Security Scheme for Wireless Sensor Networks using Efficient CSMA MAC Layer Protocol. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CBC-X, WSN, MAC, AES, CSMA/CA, CSMA, Link layer security
23Di-Rong Chen, Bin Han 0003, Sherman D. Riemenschneider Construction of multivariate biorthogonal wavelets with arbitrary vanishing moments. Search on Bibsonomy Adv. Comput. Math. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF sum rules, refinement mask, dual mask, CBC algorithm, accuracy, 65D05, 41A63, 41A05, 41A25, 41A30, refinable function, biorthogonal wavelets, approximation order, vanishing moments, 46E35
22Ke Yuan, Keke Duanmu, Jian Ge, Bingcai Zhou, Chunfu Jia A Controllable Parallel CBC Block Cipher Mode of Operation. Search on Bibsonomy J. Inf. Process. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Zhanna Alimzhanova, Maria Skublewska-Paszkowska, Dauren Nazarbayev Periodicity Detection of the Substitution Box in the CBC Mode of Operation: Experiment and Study. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Punam Kumari, Bhaskar Mondal Lightweight image encryption algorithm using NLFSR and CBC mode. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Yuanjian Li, Chunhe Song, Jingya Dong, Hao Zheng An efficient encryption method for smart grid data based on improved CBC mode. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Peter Kritzer A note on the CBC-DBD construction of lattice rules with general positive weights. Search on Bibsonomy J. Complex. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Russ Housley, Hannes Tschofenig CBOR Object Signing and Encryption (COSE): AES-CTR and AES-CBC. Search on Bibsonomy RFC The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22George Teseleanu A Note on a CBC-Type Mode of Operation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
22Niranjan Balachandran, Ashwin Jha, Mridul Nandi, Soumit Pal Revisiting Randomness Extraction and Key Derivation Using the CBC and Cascade Modes. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Tristan Nemoz, Zoé Amblard, Aurélien Dupin Characterizing the qIND-qCPA (In)security of the CBC, CFB, OFB and CTR Modes of Operation. Search on Bibsonomy PQCrypto The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Regina Padmanabhan, Yousra El Alaoui, Adel Elomri, Marwa K. Qaraqe, Halima El Omri, Ruba Yasin Taha Machine Learning for Diagnosis and Screening of Chronic Lymphocytic Leukemia Using Routine Complete Blood Count (CBC) Results. Search on Bibsonomy ICIMTH The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22George Teseleanu A Note on a CBC-Type Mode of Operation. Search on Bibsonomy SECRYPT The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Wid Akeel Awadh, Ali Salah Hashim, Alaa Khalaf Hamoud Efficiently Secure Data Communications Based on CBC-RC6 and the Overflow Field of Timestamp Option in an IPv4 Packet. Search on Bibsonomy Informatica (Slovenia) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Peter Kritzer A note on the CBC-DBD construction of lattice rules with general positive weights. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Adoté François-Xavier Ametepe, Arnaud S. R. M. Ahouandjinou, Eugène C. Ezin Robust encryption method based on AES-CBC using elliptic curves Diffie-Hellman to secure data in wireless sensor networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Tawsifur Rahman, Amith Khandakar, Farhan Fuad Abir, Md. Ahasan Atick Faisal, Md. Shafayet Hossain, Kanchon Kanti Podder, Tariq O. Abbas, Mohammed Fasihul Alam, Saad Bin Abul Kashem, Mohammad Tariqul Islam 0001, Susu M. Zughaier, Muhammad Enamul Hoque Chowdhury QCovSML: A reliable COVID-19 detection system using CBC biomarkers by a stacking machine learning model. Search on Bibsonomy Comput. Biol. Medicine The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Tristan Nemoz, Zoé Amblard, Aurélien Dupin Characterizing the qIND-qCPA (in)security of the CBC, CFB, OFB and CTR modes of operation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
22Aleksejus Mihalkovich, Matas Levinskas, Lina Dindiene, Eligijus Sakalauskas CBC Mode of MPF Based Shannon Cipher Defined Over a Non-Commuting Platform Group. Search on Bibsonomy Informatica The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Zhanna Alimzhanova, Dauren Nazarbayev, Aizada Ayashova, Aktoty Kaliyeva Analysis of Ciphertext Behaviour Using the Example of the AES Block Cipher in ECB, CBC, OFB and CFB Modes of Operation, Using Multiple Encryption. Search on Bibsonomy ACIIDS (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Márcio Dorn, Bruno Iochins Grisci, Pedro Henrique Narloch, Bruno César Feltes, Eduardo Avila, Alessandro Kahmann, Clarice Sampaio Alho Comparison of machine learning techniques to handle imbalanced COVID-19 CBC datasets. Search on Bibsonomy PeerJ Comput. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Thang Duc Phung, Thai Van Nguyen, Ban Quy Tran Design and Implementation a Secured and Distributed System using CBC, Socket, and RMI Technologies. Search on Bibsonomy ICSCA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Tiago Colliri, Marcia Minakawa, Liang Zhao 0001 Detecting Early Signs of Insufficiency in COVID-19 Patients from CBC Tests Through a Supervised Learning Approach. Search on Bibsonomy BRACIS (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Jakob Görner, Ramon Janssen, Jochen Rethmann Distributed Solving of Mixed-Integer Programs with COIN-OR CBC and Thrift. Search on Bibsonomy OR The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Shikha Purwar, Rajiv Kumar Tripathi, Ravi Ranjan, Renu Saxena Detection of microcytic hypochromia using cbc and blood film features extracted from convolution neural network by different classifiers. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Rosy Swami, Prodipto Das An effective secure data retrieval approach using trust evaluation: HBSEE-CBC. Search on Bibsonomy Int. J. Inf. Commun. Technol. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 267 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license