The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase SHA-2 (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1988-2004 (18) 2005-2006 (25) 2007 (21) 2008 (24) 2009 (22) 2010 (20) 2011 (26) 2012 (40) 2013 (47) 2014 (49) 2015 (54) 2016 (59) 2017 (45) 2018 (64) 2019 (107) 2020 (91) 2021 (118) 2022 (107) 2023 (95) 2024 (24)
Publication types (Num. hits)
article(606) data(3) incollection(3) inproceedings(439) phdthesis(5)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 61 occurrences of 39 keywords

Results
Found 1124 publication records. Showing 1056 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
227Somitra Kumar Sanadhya, Palash Sarkar 0001 New Collision Attacks against Up to 24-Step SHA-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 hash family, reduced round attacks, Cryptanalysis
164Somitra Kumar Sanadhya, Palash Sarkar 0001 Non-linear Reduced Round Attacks against SHA-2 Hash Family. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
114Somitra Kumar Sanadhya, Palash Sarkar 0001 Deterministic Constructions of 21-Step Collisions for the SHA-2 Hash Family. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SHA-2 family, reduced round attacks, cryptanalysis
109Hirotaka Yoshida, Alex Biryukov Analysis of a SHA-256 Variant. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SHA-2-XOR, SHACAL-2-XOR, Pseudo-collision resistance, Iterative patterns, Differential cryptanalysis, SHA-256
96Takanori Isobe 0001, Kyoji Shibutani Preimage Attacks on Reduced Tiger and SHA-2. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger
91Somitra Kumar Sanadhya, Palash Sarkar 0001 A new hash family obtained by modifying the SHA-2 family. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-2 hash family, reduced round attacks, cryptanalysis
62Nicolas Sklavos 0001, Odysseas G. Koufopavlou On the hardware implementations of the SHA-2 (256, 384, 512) hash functions. Search on Bibsonomy ISCAS (5) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
57Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis Improving SHA-2 Hardware Implementations. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SHA-2 (256, 512), FPGA, Cryptography, Hash functions
57Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis Cost-Efficient SHA Hardware Accelerators. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
50Somitra Kumar Sanadhya, Palash Sarkar 0001 New Local Collisions for the SHA-2 Hash Family. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
49Zeyad A. Al-Odat, Assad Abbas, Samee U. Khan Randomness Analyses of the Secure Hash Algorithms, SHA-1, SHA-2 and Modified SHA. Search on Bibsonomy FIT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
49Helena Handschuh SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm). Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
49Vlastimil Klíma, Danilo Gligoroski Generic Collision Attacks on Narrow-pipe Hash Functions Faster than Birthday Paradox, Applicable to MDx, SHA-1, SHA-2, and SHA-3 Narrow-pipe Candidates. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
34Mario Lamberger, Florian Mendel Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blender, DCH, Hash functions, collision attacks, preimage attacks, SHA-3
34William E. Burr A New Hash Competition. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
34Norbert Pramstaller, Christian Rechberger, Vincent Rijmen A compact FPGA implementation of the hash function whirlpool. Search on Bibsonomy FPGA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF compact hardware implementation, FPGA, hash function, whirlpool
34Marco Macchetti, Luigi Dadda Quasi-Pipelined Hash Circuits. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Kyungbae Jang, Sejin Lim, Yujin Oh, Hyunjun Kim, Anubhab Baksi, Sumanta Chakraborty, Hwajeong Seo Quantum Implementation and Analysis of SHA-2 and SHA-3. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
33Khouloud Eledlebi, Ahmed Adel Alzubaidi, Chan Yeob Yeun, Ernesto Damiani, Víctor Mateu, Yousof Al-Hammadi Simulation Analysis and Comparison of New Hybrid TLI-µTESLA and Variant TESLA Protocols Using SHA-2 and SHA-3 Hash Functions. Search on Bibsonomy Sensors The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
33Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent, John M. Schanck Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
33Matthew Amy, Olivia Di Matteo, Vlad Gheorghiu, Michele Mosca, Alex Parent, John M. Schanck Estimating the Cost of Generic Quantum Pre-image Attacks on SHA-2 and SHA-3. Search on Bibsonomy SAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Yusuke Naito 0001, Lei Wang 0031 Replacing SHA-2 with SHA-3 Enhances Generic Security of HMAC. Search on Bibsonomy CT-RSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
33Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre Differential Power Analysis of HMAC SHA-1 and HMAC SHA-2 in the Hamming Weight Model. Search on Bibsonomy ICETE (Selected Papers) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
33Pal-Stefan Murvay, Bogdan Groza Performance Evaluation of SHA-2 Standard vs. SHA-3 Finalists on Two Freescale Platforms. Search on Bibsonomy Int. J. Secur. Softw. Eng. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33George Athanasiou, George Theodoridis, Costas E. Goutis, Harris E. Michail, Takis Kasparis A Systematic Flow for Developing Totally Self-Checking Architectures for SHA-1 and SHA-2 Cryptographic Hash Families. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
33James Docherty, Albert Koelmans A flexible hardware implementation of SHA-1 and SHA-2 Hash Functions. Search on Bibsonomy ISCAS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Robert P. McEvoy, Michael Tunstall, Colin C. Murphy, William P. Marnane Differential Power Analysis of HMAC Based on SHA-2, and Countermeasures. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Marcio Juliato, Catherine H. Gebotys Tailoring a Reconfigurable Platform to SHA-256 and HMAC through Custom Instructions and Peripherals. Search on Bibsonomy ReConFig The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Processor Specialization, SHA-2, Cryptography, HMAC, HW/SW Partitioning, Co-Processor, Custom Instruction
16Yingxin Li, Fukang Liu, Gaoli Wang New Records in Collision Attacks on SHA-2. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
16Yingxin Li, Fukang Liu, Gaoli Wang New Records in Collision Attacks on SHA-2. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Yaacov Belenky, Ira Dushar, Valery Teper, Vadim Bugaenko, Oleg Karavaev, Leonid Azriel, Yury Kreimer Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Asimina Koutra, Vasileios Tenentes High Throughput and Energy Efficient SHA-2 ASIC Design for Continuous Integrity Checking Applications. Search on Bibsonomy ETS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Lukas Vlasak, Antoine Bouvet, Sylvain Guilley Practical Aspects of Vertical Side-Channel Analyses on HMAC-SHA-2. Search on Bibsonomy INDOCRYPT (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Hoai Luan Pham, Thi Hong Tran, Vu Trung Duong Le, Yasuhiko Nakashima A High-Efficiency FPGA-Based Multimode SHA-2 Accelerator. Search on Bibsonomy IEEE Access The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16L. Shane John Paul, Carlton Gracias, Anurag Desai, V. Thanikaiselvan, S. Suba Shanthini, Amirtharajan Rengarajan A novel colour image encryption scheme using dynamic DNA coding, chaotic maps, and SHA-2. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Hoai Luan Pham, Thi Hong Tran, Vu Trung Duong Le, Yasuhiko Nakashima A Coarse Grained Reconfigurable Architecture for SHA-2 Acceleration. Search on Bibsonomy IPDPS Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Kuan-Wai Wong, Wun-She Yap, Bok-Min Goi, Denis Chee-Keong Wong A New Image Encryption Scheme Based on Hyperchaotic System and SHA-2. Search on Bibsonomy ICDSP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Yin Zhang, Zhangqing He, Meilin Wan, Muwen Zhan, Ming Zhang, Kuang Peng, Min Song, Haoshuang Gu A New Message Expansion Structure for Full Pipeline SHA-2. Search on Bibsonomy IEEE Trans. Circuits Syst. I Regul. Pap. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Yaacov Belenky, Ira Dushar, Valery Teper, Hennadii Chernyshchyk, Leonid Azriel, Yury Kreimer First Full-Fledged Side Channel Attack on HMAC-SHA-2. Search on Bibsonomy COSADE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Debjyoti Bhattacharjee, Anirban Majumder, Anupam Chattopadhyay In-memory realization of SHA-2 using ReVAMP architecture. Search on Bibsonomy VLSID The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Raffaele Martino, Alessandro Cilardo SHA-2 Acceleration Meeting the Needs of Emerging Applications: A Comparative Survey. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Simo Sorce, Hubert Kario Generic Security Service Application Program Interface (GSS-API) Key Exchange with SHA-2. Search on Bibsonomy RFC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Raffaele Martino, Alessandro Cilardo A Flexible Framework for Exploring, Evaluating, and Comparing SHA-2 Designs. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Amnah Firdous, Aqeel-ur Rehman, Malik Muhammad Saad Missen A highly efficient color image encryption based on linear transformation using chaos theory and SHA-2. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Aqeel-ur Rehman, Xiaofeng Liao 0001 A novel robust dual diffusion/confusion encryption technique for color image based on Chaos, DNA and SHA-2. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
16Panjin Kim, Daewan Han, Kyung Chul Jeong Time-space complexity of quantum search algorithms in symmetric cryptanalysis: applying to AES and SHA-2. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
16Harsimranjit Singh Gill, Sandeep Singh Gill, Kamaljit Singh Bhatia A Novel Chaos-Based Encryption Approach for Future-Generation Passive Optical Networks Using SHA-2. Search on Bibsonomy JOCN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Johannes Merkle, Manfred Lochter HMAC-SHA-2 Authentication Protocols in User-Based Security Model (USM) for SNMPv3. Search on Bibsonomy RFC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Johannes Merkle, Manfred Lochter HMAC-SHA-2 Authentication Protocols in the User-based Security Model (USM) for SNMPv3. Search on Bibsonomy RFC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Mohamed Anane, Nadjia Anane SHA-2 hardware core for virtex-5 FPGA. Search on Bibsonomy SSD The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Marcio Juliato, Catherine H. Gebotys A Quantitative Analysis of a Novel SEU-Resistant SHA-2 and HMAC Architecture for Space Missions Security. Search on Bibsonomy IEEE Trans. Aerosp. Electron. Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
16Pawel Swierczynski, Gregor Leander, Christof Paar Keccak und der SHA-2. Search on Bibsonomy Datenschutz und Datensicherheit The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
16Sonia Belaïd, Luk Bettale, Emmanuelle Dottax, Laurie Genelle, Franck Rondepierre Differential Power Analysis of HMAC SHA-2 in the Hamming Weight Model. Search on Bibsonomy SECRYPT The full citation details ... 2013 DBLP  BibTeX  RDF
16Denis Bider, Mark D. Baushke SHA-2 Data Integrity Verification for the Secure Shell (SSH) Transport Layer Protocol. Search on Bibsonomy RFC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Ji Li, Takanori Isobe 0001, Kyoji Shibutani Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
16Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 family. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
16Ignacio Algredo-Badillo, Claudia Feregrino Uribe, René Cumplido, Miguel Morales-Sandoval Novel Hardware Architecture for Implementing the Inner Loop of the SHA-2 Algorithms. Search on Bibsonomy DSD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Florian Mendel, Tomislav Nad, Martin Schläffer Finding SHA-2 Characteristics: Searching through a Minefield of Contradictions. Search on Bibsonomy ASIACRYPT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
16Jian Guo 0001, San Ling, Christian Rechberger, Huaxiong Wang Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
16Jian Guo 0001, San Ling, Christian Rechberger, Huaxiong Wang Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2. Search on Bibsonomy ASIACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
16Somitra Kumar Sanadhya, Palash Sarkar 0001 A combinatorial analysis of recent attacks on step reduced SHA-2 family. Search on Bibsonomy Cryptogr. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Jelte Jansen Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC. Search on Bibsonomy RFC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Jian Guo 0001, Krystian Matusiewicz Preimages for Step-Reduced SHA-2. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
16Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel Cryptanalysis of Dynamic SHA(2). Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2009 DBLP  BibTeX  RDF
16Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel Cryptanalysis of Dynamic SHA(2). Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dynamic SHA, Dynamic SHA2, hash function, collision attack, SHA-3 candidate
16Kazumaro Aoki, Jian Guo 0001, Krystian Matusiewicz, Yu Sasaki, Lei Wang 0031 Preimages for Step-Reduced SHA-2. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash, preimage attack, meet-in-the-middle, SHA-256
16Somitra Kumar Sanadhya, Palash Sarkar 0001 22-Step Collisions for SHA-2 Search on Bibsonomy CoRR The full citation details ... 2008 DBLP  BibTeX  RDF
16Somitra Kumar Sanadhya, Palash Sarkar 0001 A New Hash Family Obtained by Modifying the SHA-2 Family. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
16Somitra Kumar Sanadhya, Palash Sarkar 0001 New Collision attacks Against Up To 24-step SHA-2. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
16Somitra Kumar Sanadhya, Palash Sarkar 0001 Non-Linear Reduced Round Attacks Against SHA-2 Hash family. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
16Somitra Kumar Sanadhya, Palash Sarkar 0001 A Combinatorial Analysis of Recent Attacks on Step Reduced SHA-2 Family. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
16ZiJie Xu Dynamic SHA-2. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
16Vlastimil Klíma On Collisions of Hash Functions Turbo SHA-2. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
16Todor Mladenov, Saeid Nooshabadi Implementation of reconfigurable SHA-2 hardware core. Search on Bibsonomy APCCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Danilo Gligoroski, Svein Johan Knapskog Turbo SHA-2. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
16Somitra Kumar Sanadhya, Palash Sarkar 0001 New Local Collisions for the SHA-2 Hash Family. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
16Ryan Glabb, Laurent Imbert, Graham A. Jullien, Arnaud Tisserand, Nicolas Veyrat-Charvillon Multi-mode operator for SHA-2 hash functions. Search on Bibsonomy J. Syst. Archit. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Ryan Glabb, Laurent Imbert, Graham A. Jullien, Arnaud Tisserand, Nicolas Veyrat-Charvillon Multi-Mode Operator for SHA-2 Hash Functions. Search on Bibsonomy ERSA The full citation details ... 2006 DBLP  BibTeX  RDF
16Robert P. McEvoy, Francis M. Crowe, Colin C. Murphy, William P. Marnane Optimisation of the SHA-2 Family of Hash Functions on FPGAs. Search on Bibsonomy ISVLSI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Nicolas Sklavos 0001, Odysseas G. Koufopavlou Implementation of the SHA-2 Hash Family Standard Using FPGAs. Search on Bibsonomy J. Supercomput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Nils Bruin Visualising Sha[2] in Abelian surfaces. Search on Bibsonomy Math. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Philip Hawkes, Michael Paddon, Gregory G. Rose On Corrective Patterns for the SHA-2 Family. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
11Florian Mendel, Martin Schläffer On Free-Start Collisions and Collisions for TIB3. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-3 competition, TIB3, free-start collision, Hash function, collision attack
11Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
11Gaoli Wang Related-Key Rectangle Attack on 43-Round SHACAL-2. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SHACAL-2, Differential characteristic, Block cipher, Related-Key Rectangle attack
11YongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee 0002 Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Differential-Linear Type Attacks, SHACAL-2, Block Cipher
11Jongsung Kim, Guil Kim, Sangjin Lee 0002, Jongin Lim 0001, Jung Hwan Song Related-Key Attacks on Reduced Rounds of SHACAL-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
11Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee 0002 Impossible Differential Attack on 30-Round SHACAL-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
2Xu Yang, Shaowei Wang 0002, Yi Li, Shaohua Wang 0002 Does data sampling improve deep learning-based vulnerability detection? Yeas! and Nays! Search on Bibsonomy ICSE The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
1Vishal Gotarane, Satheesh Abimannan, Shahid Hussain 0002, Reyazur Rashid Irshad A Hybrid Framework Leveraging Whale Optimization and Deep Learning With Trust-Index for Attack Identification in IoT Networks. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Reyazur Rashid Irshad, Zakir Hussain, Ihtisham Hussain, Shahid Hussain 0002, Ehtisham Asghar, Ibrahim M. Alwayle, Khaled M. Alalayah, Adil Yousif, Awad Ali Enhancing Cloud-Based Inventory Management: A Hybrid Blockchain Approach With Generative Adversarial Network and Elliptic Curve Diffie Helman Techniques. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Waleed Alam, Muhammad Tahir 0007, Shahid Hussain 0002, Sarah Gul, Maqsood Hayat, Reyazur Rashid Irshad, Fabiano Pallonetto Unveiling the Potential Pattern Representation of RNA 5-Methyluridine Modification Sites Through a Novel Feature Fusion Model Leveraging Convolutional Neural Network and Tetranucleotide Composition. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Saurabh Shukla, Shahid Hussain 0002, Reyazur Rashid Irshad, Ahmed Abdu Alattab, Subhasis Thakur, John G. Breslin, Mohd Fadzil Hassan 0001, Satheesh Abimannan, Moh. Shahid Husain, Syed Muslim Jameel Network analysis in a peer-to-peer energy trading model using blockchain and machine learning. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Junaid Khan Kakar, Shahid Hussain 0002, Sang Cheol Kim, Hyongsuk Kim TimeTector: A Twin-Branch Approach for Unsupervised Anomaly Detection in Livestock Sensor Noisy Data (TT-TBAD). Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Shahid Khan 0002, Joost-Pieter Katoen, Marc Bouissou A Compositional Semantics of Boolean-Logic Driven Markov Processes. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Haibo Liu, Qu Luo, Zi Long Liu 0001, Shan Luo 0002, Pei Xiao, Rongping Lin BER Analysis of SCMA-OFDM Systems in the Presence of Carrier Frequency Offset. Search on Bibsonomy IEEE Commun. Lett. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Wentao Ma, Xinyi Wu, Shan Zhao 0002, Tongqing Zhou, Dan Guo, Lichuan Gu, Zhiping Cai, Meng Wang 0001 FedSH: Towards Privacy-Preserving Text-Based Person Re-Identification. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Xinyi Wu, Wentao Ma, Dan Guo, Tongqing Zhou, Shan Zhao 0002, Zhiping Cai Text-Based Occluded Person Re-identification via Multi-Granularity Contrastive Consistency Learning. Search on Bibsonomy AAAI The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Juan Zou, Tingrui Pei, Cheng Li 0008, Ruoyou Wu, Shanshan Wang 0002 Self-Supervised Federated Learning for Fast MR Imaging. Search on Bibsonomy IEEE Trans. Instrum. Meas. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1056 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license