|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 14 occurrences of 10 keywords
|
|
|
Results
Found 11 publication records. Showing 11 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
155 | Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman |
Differential and Rectangle Attacks on Reduced-Round SHACAL-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 17-31, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
SHACAL-1, Amplified boomerang attack, Block cipher, Differential cryptanalysis, Rectangle attack |
130 | Eli Biham, Orr Dunkelman, Nathan Keller |
Rectangle Attacks on 49-Round SHACAL-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 22-35, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
96 | Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee 0002, Dowon Hong |
The Related-Key Rectangle Attack - Application to SHACAL-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 123-136, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
The Rectangle Attack, The Related-Key Attack, The Related-Key Rectangle Attack, SHACAL-1, Block Ciphers |
90 | Eli Biham, Orr Dunkelman, Nathan Keller |
A Simple Related-Key Attack on the Full SHACAL-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 20-30, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
80 | Máire McLoone, John V. McCanny |
Very High Speed 17 Gbps SHACAL Encryption Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Field Programmable Logic and Application, 13th International Conference, FPL 2003, Lisbon, Portugal, September 1-3, 2003, Proceedings, pp. 111-120, 2003, Springer, 3-540-40822-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
SHACAL, NESSIE |
70 | Orr Dunkelman, Nathan Keller, Jongsung Kim |
Related-Key Rectangle Attack on the Full SHACAL-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers, pp. 28-44, 2006, Springer, 978-3-540-74461-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
65 | Gaoli Wang, Nathan Keller, Orr Dunkelman |
The Delicate Issues of Addition with Respect to XOR Differences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers, pp. 212-231, 2007, Springer, 978-3-540-77359-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SHACAL-1, Block cipher, IDEA, Related-Key Rectangle attack |
50 | Seokhie Hong, Jongsung Kim, Sangjin Lee 0002, Bart Preneel |
Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption: 12th International Workshop, FSE 2005, Paris, France, February 21-23, 2005, Revised Selected Papers, pp. 368-383, 2005, Springer, 3-540-26541-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Markku-Juhani Olavi Saarinen |
Cryptanalysis of Block Ciphers Based on SHA-1 and MD5. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 36-44, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
SHACAL, Dedicated hash functions, MDC, MD5, SHA-1, Slide attacks |
30 | Ruilin Li, Chao Li 0002, Chunye Gong |
Differential Fault Analysis on SHACAL-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDTC ![In: Sixth International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, Lausanne, Switzerland, 6 September 2009, pp. 120-126, 2009, IEEE Computer Society, 978-0-7695-3824-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Orr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks |
Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 157-168, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
HAS-160, differential cryptanalysis, related-key rectangle attack |
Displaying result #1 - #11 of 11 (100 per page; Change: )
|
|