|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1525 occurrences of 465 keywords
|
|
|
Results
Found 2657 publication records. Showing 2657 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
118 | James L. Massey, Ueli M. Maurer, Muzhong Wang |
Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings, pp. 237-247, 1987, Springer, 3-540-19102-X. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
117 | Nicolas T. Courtois |
The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Conference ![In: Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers, pp. 170-188, 2004, Springer, 3-540-26557-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
interpolation attack on block ciphers, fractional transformations, homographic functions, generalised linear cryptanalysis, bi-linear cryptanalysis, Block ciphers, AES, Rijndael, Feistel ciphers, multivariate equations |
114 | Adam L. Young, Moti Yung |
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 297-311, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography |
86 | Lars R. Knudsen, John Erik Mathiassen |
On the Role of Key Schedules in Attacks on Iterated Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings, pp. 322-334, 2004, Springer, 3-540-22987-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
79 | Jovan Dj. Golic |
Modes of Operation of Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000, Proceedings, pp. 233-247, 2000, Springer, 3-540-42069-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
keyed hash functions, security, Stream ciphers, block ciphers, hash functions, conversions |
78 | Souradyuti Paul, Bart Preneel |
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 69-83, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
75 | Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck |
CryptoGraphics: Secret Key Cryptography Using Graphics Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 334-350, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Graphics Processing Unit, Stream Ciphers, Block Ciphers, AES |
74 | Nicolas T. Courtois |
Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings, pp. 176-194, 2003, Springer, 3-540-40674-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
combiners with memory, LFSR synthesis, Toyocrypt, Cryptrec, LILI-128, E0, Boolean functions, stream ciphers, Bluetooth, nonlinear filters, Algebraic attacks, Berlekamp-Massey algorithm, Nessie, multivariate equations |
74 | Pawel Chodowiec, Po Khuon, Kris Gaj |
Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPGA ![In: Proceedings of the ACM/SIGDA International Symposium on Field Programmable Gate Arrays, FPGA 2001, Monterey, CA, USA, February 11-13, 2001, pp. 94-102, 2001, ACM, 1-58113-341-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
fast architectures, secret-key ciphers, pipelining, AES |
71 | Moses D. Liskov, Ronald L. Rivest, David A. Wagner 0001 |
Tweakable Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 31-46, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
tweakable block ciphers, initialization vector, block ciphers, modes of operation |
69 | Gautham Sekar, Souradyuti Paul, Bart Preneel |
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers, pp. 127-141, 2007, Springer, 978-3-540-88352-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
69 | Nicolas Sklavos 0001, Nick A. Moldovyan, Odysseas G. Koufopavlou |
High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 10(1-2), pp. 219-231, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Cobra-H64, Cobra-H128, networking security, encryption, data-dependent permutations |
69 | Thomas Johansson 0001 |
Analysis and Design of Modern Stream Ciphers: (Invited Paper) p. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings, pp. 66, 2003, Springer, 3-540-20663-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
67 | Nicolas T. Courtois |
General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AES Conference ![In: Advanced Encryption Standard - AES, 4th International Conference, AES 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers, pp. 67-83, 2004, Springer, 3-540-26557-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
polynomial relations, design of cryptographic primitives, generalised linear cryptanalysis, multivariate public key encryption and signature schemes, Quartz, combiners with memory, elimination methods, Gröbner bases, Boolean functions, stream ciphers, block ciphers, AES, finite fields, algebraic attacks, Rijndael, Serpent, HFE, Sflash, multivariate equations |
66 | Don Coppersmith, Shai Halevi, Charanjit S. Jutla |
Cryptanalysis of Stream Ciphers with Linear Masking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 515-532, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Linear masking, Low-Diffusion attacks, Stream ciphers, Hypothesis testing, Linear cryptanalysis |
66 | Alex Biryukov, Adi Shamir |
Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 1-13, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
time/memory tradeoff attacks, Cryptanalysis, stream ciphers |
66 | Rüdiger Weis, Stefan Lucks |
Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECMAST ![In: Multimedia Applications, Services and Techniques - ECMAST'99, 4th European Conference, Madrid, Spain, May 1999, Proceedings, pp. 456-471, 1999, Springer, 3-540-66082-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Luby-Rackoff ciphers, BEAR, LION, BEAST, JAVA, Performance, block cipher |
63 | William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan |
Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 390-407, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
cascaded ciphers, Shannon model, Double DES, information theory, DES, Ciphers, meet in the middle attacks |
61 | Keke Wu, Huiyun Li, Bo Peng, Fengqi Yu |
Correlation Power Analysis Attack against Synchronous Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 2067-2072, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
61 | Mridul Nandi |
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 350-362, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
online cipher, CBC, universal hash function, random permutation |
61 | James G. Dunham, Ming-Tan Sun, J. C. R. Tseng |
Classifying file type of stream ciphers in depth using neural networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), January 3-6, 2005, Cairo, Egypt, pp. 97, 2005, IEEE Computer Society, 0-7803-8735-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
61 | Thomas Jakobsen, Lars R. Knudsen |
The Interpolation Attack on Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings, pp. 28-40, 1997, Springer, 3-540-63247-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
58 | Shakil Ahmad, Muhammad Arif Wahla, Firdous Kausar |
Authenticated Encryption in WSN Using eSTREAM Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 741-749, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Security, Wireless Sensor Networks, Stream Ciphers, Authenticated Encryption |
58 | Nicolas T. Courtois, Josef Pieprzyk |
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 267-287, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
MQ problem, overdefined systems of multivariate equations, Gröbner bases, sparse multivariate polynomials, Multivariate Cryptanalysis, Block ciphers, AES, Rijndael, Square, Camellia, Serpent, XL algorithm, multivariate quadratic equations |
55 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
Elastic block ciphers: method, security and instantiations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(3), pp. 211-231, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Elastic block ciphers, Variable-length block ciphers, Reduction proof, Security analysis, Key recovery attacks |
54 | Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002, Dukjae Moon |
Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings, pp. 201-219, 2005, Springer, 3-540-30276-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Cobra-H64, Cobra-H128, Block Ciphers, Related-Key Attacks, Data-Dependent Permutations |
53 | Lan Luo, Zhiguang Qin, Shijie Zhou |
A Comment to the Intelligent Functions of Different Weight Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, WKDD 2009, Moscow, Russia, 23-25 January 2009, pp. 531-534, 2009, IEEE Computer Society, 978-0-7695-3543-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
53 | Christophe De Cannière, Orr Dunkelman, Miroslav Knezevic |
KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2009, 11th International Workshop, Lausanne, Switzerland, September 6-9, 2009, Proceedings, pp. 272-288, 2009, Springer, 978-3-642-04137-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
53 | Johann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann 0007, Marcel Medwed |
Energy evaluation of software implementations of block ciphers under memory constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2007 Design, Automation and Test in Europe Conference and Exposition, DATE 2007, Nice, France, April 16-20, 2007, pp. 1110-1115, 2007, EDA Consortium, San Jose, CA, USA, 978-3-9810801-2-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
energy optimization, code size reduction, symmetric cipher, lightweight cryptography, memory footprint |
53 | Gautham Sekar, Souradyuti Paul, Bart Preneel |
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 58-72, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten |
Differential Power Analysis of Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 257-270, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain |
53 | Shoichi Hirose |
Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers, pp. 339-352, 2002, Springer, 3-540-00622-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
53 | Xuejia Lai, James L. Massey, Sean Murphy |
Markov Ciphers and Differential Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 17-38, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
52 | Debra L. Cook, Angelos D. Keromytis, Moti Yung |
Elastic block ciphers: the basic design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 350-352, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
elastic block ciphers, variable-length block ciphers, encryption, block ciphers |
51 | Nicolas T. Courtois |
Cryptanalysis of Sfinks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 261-269, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
solving systems of multivariate equations, fast algebraic attacks on stream ciphers, Boolean functions, stream ciphers, nonlinear filters, algebraic cryptanalysis |
50 | Nicolas Fournel, Marine Minier, Stéphane Ubéda |
Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISTP ![In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems, First IFIP TC6 / WG 8.8 / WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007, Proceedings, pp. 202-214, 2007, Springer, 978-3-540-72353-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
benchmarks, sensors, stream ciphers |
50 | Mohamed Amine Garici, Habiba Drias |
Cryptanalysis of Substitution Ciphers Using Scatter Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWINAC (2) ![In: Artificial Intelligence and Knowledge Engineering Applications: A Bioinspired Approach: First International Work-Conference on the Interplay Between Natural and Artificial Computation, IWINAC 2005, Las Palmas, Canary Islands, Spain, June 15-18, 2005, Proceedings, Part II, pp. 31-40, 2005, Springer, 3-540-26319-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
automated cryptanalysis, substitution ciphers, genetic algorithm, heuristic search, optimization problem, scatter search, evolutionary approach |
50 | Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 98-109, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
IDEA and MESH ciphers, known-plaintext attack, Cryptanalysis |
50 | Jorge Nakahara Jr. |
Faster Variants of the MESH Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings, pp. 162-174, 2004, Springer, 3-540-24130-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
byte-oriented block ciphers, smart cards, algebraic attacks, IDEA |
50 | Nikhil Joshi, Kaijie Wu 0001, Ramesh Karri |
Concurrent Error Detection Schemes for Involution Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 400-412, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Involutional ciphers, KHAZAD, Fault Tolerance, Concurrent Error Detection (CED) |
50 | Nicolas T. Courtois, Willi Meier |
Algebraic Attacks on Stream Ciphers with Linear Feedback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 345-359, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Algebraic attacks on stream ciphers, factoring multivariate polynomials, overdefined problems, ciphertext-only attacks, Toyocrypt, Cryptrec, LILI-128, Boolean functions, nonlinear filtering, pseudo-random generators, Nessie, XL algorithm, multivariate equations |
50 | Palash Sarkar 0001 |
The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 533-548, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
synchronous stream ciphers, nonlinear filter model, nonlinear combiner model, filter-combiner model, cellular automata, linear feedback shift registers |
49 | Adam J. Elbirt, Christof Paar |
Instruction-Level Distributed Processing for Symmetric-Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 22-26 April 2003, Nice, France, CD-ROM/Abstracts Proceedings, pp. 78, 2003, IEEE Computer Society, 0-7695-1926-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
algorithm-agility, FPGA, cryptography, VHDL, block cipher |
49 | Elad Barkan, Eli Biham |
In How Many Ways Can You Write Rijndael? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 160-175, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
49 | Eli Biham |
Cryptanalysis of Ladder-DES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 4th International Workshop, FSE '97, Haifa, Israel, January 20-22, 1997, Proceedings, pp. 134-138, 1997, Springer, 3-540-63247-6. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
45 | Gregor Leander, Erik Zenner, Philip Hawkes |
Cache Timing Analysis of LFSR-Based Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings, pp. 433-445, 2009, Springer, 978-3-642-10867-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
45 | Gordon Meiser, Thomas Eisenbarth 0001, Kerstin Lemke-Rust, Christof Paar |
Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIES ![In: IEEE Third International Symposium on Industrial Embedded Systems, SIES 2008, Montpellier / La Grande Motte, France, June 11-13, 2008, pp. 58-66, 2008, IEEE, 978-1-4244-1994-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Gautham Sekar, Souradyuti Paul, Bart Preneel |
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 249-262, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Ermaliza Razali, Raphael C.-W. Phan, Marc Joye |
On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings, pp. 188-197, 2007, Springer, 978-3-540-75669-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
pseudorandom permutation (PRP), key recovery (KR), related key attacks (RKA), block cipher, Provable security |
45 | Khoongming Khoo, Guang Gong, Hian-Kiat Lee |
The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 194-209, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Time-memory-data trade-off attack, Rainbow attack, Maiorana-McFarland functions |
45 | Johannes Buchmann 0001, Andrei Pyshkin, Ralf-Philipp Weinmann |
Block Ciphers Sensitive to Gröbner Basis Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2006, The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings, pp. 313-331, 2006, Springer, 3-540-31033-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Imran Erguler, Emin Anarim |
A New Cryptanalytic Time-Memory Trade-Off for Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings, pp. 215-223, 2005, Springer, 3-540-29414-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
45 | Adi Shamir |
Stream Ciphers: Dead or Alive? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 78, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
45 | Jonathan J. Hoch, Adi Shamir |
Fault Analysis of Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2004: 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings, pp. 240-253, 2004, Springer, 3-540-22666-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Lili-128, SOBER-t32, Stream cipher, LFSR, fault attack, RC4 |
45 | Alex Biryukov |
Analysis of Involutional Ciphers: Khazad and Anubis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 45-53, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
45 | Jorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle |
The MESH Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, pp. 458-473, 2003, Springer, 3-540-20827-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
45 | Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram |
Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002. Revised Papers, pp. 271-290, 2002, Springer, 3-540-00622-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
45 | Ueli M. Maurer |
New Approaches to the Design of Self-Synchronizing Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 458-471, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
45 | Shimon Even, Oded Goldreich 0001 |
On the Power of Cascade Ciphers ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 3(2), pp. 108-116, 1985. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
42 | Shai Halevi, Don Coppersmith, Charanjit S. Jutla |
Scream: A Software-Efficient Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers, pp. 195-209, 2002, Springer, 3-540-44009-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Round functions, Stream ciphers, Block ciphers, SEAL |
42 | Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen |
GEM: A Generic Chosen-Ciphertext Secure Encryption Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings, pp. 263-276, 2002, Springer, 3-540-43224-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
generic conversion, stream ciphers, block ciphers, Public-key encryption, random oracle model, chosen-ciphertext security, hybrid encryption |
42 | Hideki Imai, Atsuhiro Yamagishi |
CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 399-400, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
cryptographic technology, asymmmetric ciphers, evaluation, symmetric ciphers |
42 | Joan Daemen, René Govaerts, Joos Vandewalle |
A Hardware Design Model for Cryptographic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings, pp. 419-434, 1992, Springer, 3-540-56246-X. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
Hardware Cryptography, Pseudorandom Sequence Generators, Stream Ciphers, Block Ciphers, Cryptographic Hash Functions |
42 | Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel |
A New Approach to chi2 Cryptanalysis of Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 1-16, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
? 2, square and linear cryptanalysis, Block ciphers |
42 | David Oranchak |
Evolutionary algorithm for decryption of monoalphabetic homophonic substitution ciphers encoded as constraint satisfaction problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2008, Proceedings, Atlanta, GA, USA, July 12-16, 2008, pp. 1717-1718, 2008, ACM, 978-1-60558-130-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
codebreaking, homophonic substitution, zodiac killer, zodiac murder ciphers, genetic algorithms, cryptography, evolutionary computing, constraint satisfaction |
42 | Shahram Khazaei, Willi Meier |
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 15-26, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Self-synchronizing Stream Ciphers, T-functions, Key Recovery |
42 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
The Security of Elastic Block Ciphers Against Key-Recovery Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 89-103, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Variable-length block ciphers, reduction proof, security analysis, key recovery attacks |
42 | Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson |
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 11-28, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
filter function, stream ciphers, initialization, algebraic attacks, clock-control |
42 | Alexander A. Moldovyan, Nick A. Moldovyan, Nicolas Sklavos 0001 |
Controlled elements for designing ciphers suitable to efficient VLSI implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 32(2-3), pp. 149-163, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Security, Block ciphers, Hardware implementation, Data-dependent operations |
42 | Pascal Junod, Serge Vaudenay |
FOX : A New Family of Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 11th International Workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004, Revised Selected Papers, pp. 114-129, 2004, Springer, 3-540-24327-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Lai-Massey scheme, Block ciphers |
42 | Howard M. Heys |
Analysis of the Statistical Cipher Feedback Mode of Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 52(1), pp. 77-92, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
block cipher modes, Cryptography, synchronization, stream ciphers, error propagation |
42 | Alex Biryukov, Christophe De Cannière |
Block Ciphers and Systems of Quadratic Equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 274-289, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Khazad, Misty, Block ciphers, linearization, Rijndael, Camellia, Serpent, multivariate quadratic equations |
42 | John Black, Phillip Rogaway |
Ciphers with Arbitrary Finite Domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings, pp. 114-130, 2002, Springer, 3-540-43224-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Provable security, Modes of Operation, Symmetric Encryption, Ciphers |
42 | Philip Hawkes, Gregory G. Rose |
Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 303-316, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
SOBER, t-class, SSC-II, cryptanalysis, stream ciphers |
42 | Vladimir V. Chepyzhov, Thomas Johansson 0001, Ben J. M. Smeets |
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, pp. 181-195, 2000, Springer, 3-540-41728-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
cryptanalysis, Stream ciphers, correlation attacks |
41 | Dirk Stegemann |
Extended BDD-Based Cryptanalysis of Keystream Generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers, pp. 17-35, 2007, Springer, 978-3-540-77359-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
F-FCSR, cryptanalysis, Stream cipher, BDD, Trivium, Grain |
41 | Adam J. Elbirt, Christof Paar |
An Instruction-Level Distributed Processor for Symmetric-Key Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 16(5), pp. 468-480, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
algorithm-agility, FPGA, Cryptography, VHDL, block cipher |
41 | Nicolas T. Courtois |
Algebraic Attacks on Combiners with Memory and Several Outputs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 3-20, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Firdous Kausar, Ayesha Naureen |
A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 682-691, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
H-128, Wireless Sensor Network (WSN), Pervasive Computing, Stream Ciphers, Rabbit |
38 | Deike Priemuth-Schmid, Alex Biryukov |
Slid Pairs in Salsa20 and Trivium. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 1-14, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Salsa20, cryptanalysis, stream ciphers, eSTREAM, Trivium |
38 | Sondre Rønjom, Tor Helleseth |
The Linear Vector Space Spanned by the Nonlinear Filter Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSC ![In: Sequences, Subsequences, and Consequences, International Workshop, SSC 2007, Los Angeles, CA, USA, May 31 - June 2, 2007, Revised Invited Papers, pp. 169-183, 2007, Springer, 978-3-540-77403-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cyclic vector spaces, stream ciphers, m-sequences |
38 | Raphael C.-W. Phan, Mohammad Umar Siddiqi |
A Framework for Describing Block Cipher Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(11), pp. 1402-1409, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
framework, cryptanalysis, generalization, Encryption, block ciphers, distinguishers |
38 | Frédéric Didier, Jean-Pierre Tillich |
Computing the Algebraic Immunity Efficiently. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers, pp. 359-374, 2006, Springer, 3-540-36597-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Low degree multiple, Boolean functions, Stream ciphers, Algebraic attacks, Algebraic immunity, Annihilator |
38 | Jovan Dj. Golic |
DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings, pp. 98-112, 2003, Springer, 3-540-40833-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Keyed reversible circuits, data scrambling, probing attacks, block ciphers, power analysis, countermeasures |
38 | Nick A. Moldovyan |
On Cipher Design Based on Switchable Controlled Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings, pp. 316-327, 2003, Springer, 3-540-40797-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Fast Encryption, Hardware-Oriented Ciphers, Switchable Operations, Controlled Operations, Data-Dependent Operations |
38 | Lars R. Knudsen, David A. Wagner 0001 |
Integral Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers, pp. 112-127, 2002, Springer, 3-540-44009-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
MISTY, integrals, Cryptanalysis, block ciphers |
38 | Anne Canteaut, Marion Videau |
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 518-533, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
higher order differential cryptanalysis, Boolean functions, Block ciphers, nonlinearity |
38 | Nicolas T. Courtois |
Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 182-199, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
overdefined systems of multivariate equations, MQ problem, Gröbner bases, ciphertext-only attacks, Toyocrypt-HR1, Toyocrypt-HS1, Cryptrec, stream ciphers, nonlinear filtering, pseudo-random generators, Multivariate cryptography, XL algorithm |
38 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Fast Correlation Attack Algorithm with List Decoding and an Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers, pp. 196-210, 2001, Springer, 3-540-43869-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
nonlinear combiner, cryptanalysis, Stream ciphers, linear feedback shift registers, nonlinear filter, keystream generators |
38 | Helger Lipmaa |
IDEA: A Cipher For Multimedia Architectures? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography '98, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, Proceedings, pp. 248-263, 1998, Springer, 3-540-65894-7. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
multimedia architectures, Pentium MMX, block ciphers, IDEA, fast implementations |
37 | Zhiyuan Wang, Jianhua Huang, Ziming Guan |
The SOBER Family Ciphers Reconfigurable Processing Architecture Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 322-326, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin |
On Compression of Data Encrypted with Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DCC ![In: 2009 Data Compression Conference (DCC 2009), 16-18 March 2009, Snowbird, UT, USA, pp. 213-222, 2009, IEEE Computer Society, 978-0-7695-3592-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Dimitris Theodoropoulos, Alexandros Siskos, Dionisios N. Pnevmatikatos |
CCproc: A Custom VLIW Cryptography Co-processor for Symmetric-Key Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARC ![In: Reconfigurable Computing: Architectures, Tools and Applications, 5th International Workshop, ARC 2009, Karlsruhe, Germany, March 16-18, 2009. Proceedings, pp. 318-323, 2009, Springer, 978-3-642-00640-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Cryptography, VLIW, reconfigurable processors |
37 | Onur Özen, Kerem Varici, Cihangir Tezcan, Çelebi Kocair |
Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 90-107, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Hight, Impossible Differential Attack, Present, Related-Key Attack, Rectangle Attack |
37 | Daniel J. Bernstein |
The Salsa20 Family of Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The eSTREAM Finalists ![In: New Stream Cipher Designs - The eSTREAM Finalists, pp. 84-97, 2008, Springer, 978-3-540-68350-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 187-202, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security analysis, differential cryptanalysis, linear cryptanalysis |
37 | Yassin M. Hasan, Hesham A. Abulenein |
Key-linked block ciphers with input-output shuffling applied to remotely keyed encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMSWARE ![In: Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), January 5-10, 2008, Bangalore, India, pp. 254-259, 2008, IEEE, 978-1-4244-1797-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum |
An Analysis of the Hermes8 Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 1-10, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Hermes8, Cryptanalysis, Stream Cipher |
37 | N. Nalini, G. Raghavendra Rao |
Cryptanalysis of Block Ciphers via Improved Simulated Annealing Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: 9th International Conference in Information Technology, ICIT 2006, Bhubaneswar, Orissa, India, 18-21 December 2006, pp. 182-185, 2006, IEEE Computer Society, 0-7695-2635-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
37 | Sandeep S. Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer, Manfred Schimmler |
Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2006, 8th International Workshop, Yokohama, Japan, October 10-13, 2006, Proceedings, pp. 101-118, 2006, Springer, 3-540-46559-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 2657 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|