The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for ECRYPT with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2004-2006 (17) 2007-2008 (18) 2009-2011 (3)
Publication types (Num. hits)
article(4) incollection(5) inproceedings(29)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 60 occurrences of 34 keywords

Results
Found 38 publication records. Showing 38 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
76Bart Preneel ECRYPT: The Cryptographic Research Challenges for the Next Decade. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
50Yi Lu 0002, Huaxiong Wang, San Ling Cryptanalysis of Rabbit. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ECRYPT, stream cipher, bias, distinguishing attack, keystream, Rabbit
40 ECRYPT Stream Cipher Project. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
40Jana Dittmann, Andreas Lang 0001, Martin Steinebach, Stefan Katzenbeisser 0001 ECRYPT - European Network of Excellence in Cryptology, Aspekte der Sicherheit von Mediendaten. Search on Bibsonomy Sicherheit The full citation details ... 2005 DBLP  BibTeX  RDF
33Yukiyasu Tsunoo, Teruo Saito, Takeshi Kawabata, Hiroki Nakashima Distinguishing Attack Against TPypy. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ECRYPT, Py family of stream ciphers, TPypy, distinguishing attack, eSTREAM
18Aleksandar Kircanski, Amr M. Youssef Differential Fault Analysis of Rabbit. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Gautham Sekar, Bart Preneel Improved Distinguishing Attacks on HC-256. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Haina Zhang, Lin Li, Xiaoyun Wang 0001 Fast correlation attack on stream cipher ABC v3. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ABC v3, cryptanalysis, stream cipher, fast correlation attack
18Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert Sosemanuk, a Fast Software-Oriented Stream Cipher. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Philip Hawkes, Cameron McDonald, Michael Paddon, Gregory G. Rose, Miriam Wiggers de Vries Specification for NLSv2. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert Decimv2. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Daniel J. Bernstein The Salsa20 Family of Stream Ciphers. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Pierre-Alain Fouque, Gaëtan Leurent Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, provable security, syndrome decoding, quasi-cyclic code
18Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key-dependent S-box, Mir-1, stream cipher, eSTREAM, key recovery attack
18Xiao-Li Huang, Chuan-Kun Wu Cryptanalysis of Achterbahn-Version 1 and -Version 2. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream cipher, distinguishing attack, cryptology, eSTREAM
18Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki Cryptanalysis of Mir-1: A T-Function-Based Stream Cipher. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Gautham Sekar, Souradyuti Paul, Bart Preneel New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Gautham Sekar, Souradyuti Paul, Bart Preneel New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Nicolas Fournel, Marine Minier, Stéphane Ubéda Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF benchmarks, sensors, stream ciphers
18Antoine Joux, Jean-René Reinhard Overtaking VEST. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF inner collision, chosen IV attack, Stream cipher
18Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum An Analysis of the Hermes8 Stream Ciphers. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hermes8, Cryptanalysis, Stream Cipher
18Haina Zhang, Xiaoyun Wang 0001 Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF T-function, chosen IV attack, TSC-4, stream cipher, Differential cryptanalysis
18Markku-Juhani Olavi Saarinen Linearization Attacks Against Syndrome Based Hashes. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FSB, Syndrome Based Hashes, Provably Secure Hashes, Hash Function Cryptanalysis, Linearization Attack
18Bin Zhang 0003, Dengguo Feng Security analysis of a new stream cipher. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF divide-and-conquer attack, non-linear feedback shift registers (NLFSR), stream cipher, chaotic sequence
18Alexander Maximov Cryptanalysis of the "Grain" family of stream ciphers. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF decoding problem, cryptanalysis, correlation attacks, distinguisher, grain
18Ali Doganaksoy, Faruk Göloglu On Lempel-Ziv Complexity of Sequences. Search on Bibsonomy SETA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Lempel-Ziv complexity, ?2-statistics, randomness
18Tor Helleseth, Cees J. A. Jansen, Shahram Khazaei, Alexander Kholosha Security of Jump Controlled Sequence Generators for Stream Ciphers. Search on Bibsonomy SETA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF jump register, key-stream generator, linear relations, Cryptanalysis, stream cipher, Pomaranch
18Antoine Joux, Frédéric Muller Chosen-Ciphertext Attacks Against MOSQUITO. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Côme Berbain, Henri Gilbert, Alexander Maximov Cryptanalysis of Grain. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Stream cipher, Correlation attack, Walsh transform
18Souradyuti Paul, Bart Preneel, Gautham Sekar Distinguishing Attacks on the Stream Cipher Py. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Hongjun Wu 0001, Bart Preneel Resynchronization Attacks on WG and LEX. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF resynchronization attack, WG, cryptanalysis, stream cipher, differential attack, LEX, slide attack
18Matthew Henricksen, Ed Dawson Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intel Pentium 4, Dragon, HC-256, MAG, Mir-1, Py, Implementation, Stream cipher, RC4
18Sourav Mukhopadhyay, Palash Sarkar 0001 On the Effectiveness of TMTO and Exhaustive Search Attacks. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptanalysis, one-way function
18Frédéric Muller, Thomas Peyrin Linear Cryptanalysis of the TSC Family of Stream Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Jin Hong 0001, Palash Sarkar 0001 New Applications of Time Memory Data Tradeoffs. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF time memory data tradeoff
18Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Hong Wang Weaknesses of COSvd (2, 128) Stream Cipher. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF COS cipher, Non- linear feedback shift register, Stream cipher, Divide-and-Conquer
18Nicolas T. Courtois Cryptanalysis of Sfinks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF solving systems of multivariate equations, fast algebraic attacks on stream ciphers, Boolean functions, stream ciphers, nonlinear filters, algebraic cryptanalysis
18Håkan Englund, Alexander Maximov Attack the Dragon. Search on Bibsonomy INDOCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #38 of 38 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license