The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase block-cipher (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-1992 (15) 1993-1994 (15) 1995-1997 (19) 1998 (22) 1999 (19) 2000 (29) 2001 (37) 2002 (50) 2003 (56) 2004 (46) 2005 (56) 2006 (71) 2007 (80) 2008 (85) 2009 (86) 2010 (40) 2011 (46) 2012 (51) 2013 (39) 2014 (60) 2015 (51) 2016 (53) 2017 (41) 2018 (50) 2019 (40) 2020 (49) 2021 (48) 2022 (69) 2023 (61) 2024 (19)
Publication types (Num. hits)
article(542) book(1) incollection(11) inproceedings(837) phdthesis(12)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 801 occurrences of 281 keywords

Results
Found 1403 publication records. Showing 1403 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
133Liting Zhang, Wenling Wu, Lei Zhang 0012, Yanjun Li A note on Cook's elastic block cipher. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF elastic block cipher, variable-input-length block cipher, encryption, block cipher, security model, pseudorandomness
104Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Error correcting cipher, Joint error correction and encryption, Coding and cryptography, Block cipher, Error correcting code
95Kazuhiko Minematsu Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Cipher Mode, Birthday Bound, Tweakable Block Cipher
91Phillip Rogaway, Mihir Bellare, John Black OCB: A block-cipher mode of operation for efficient authenticated encryption. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block-cipher usage, authenticity, cryptography, integrity, standards, encryption, AES, provable security, modes of operation
86Debra L. Cook, Moti Yung, Angelos D. Keromytis Elastic block ciphers: method, security and instantiations. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Elastic block ciphers, Variable-length block ciphers, Reduction proof, Security analysis, Key recovery attacks
79Howard M. Heys Analysis of the Statistical Cipher Feedback Mode of Block Ciphers. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block cipher modes, Cryptography, synchronization, stream ciphers, error propagation
78Shuai Chen, XianXin Zhong, Zhengzhong Wu Chaos block cipher for wireless sensor network. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF discrete chaos, encryption function, single byte, wireless sensor network, block cipher
77Julien Bringer, Hervé Chabanne, Emmanuelle Dottax Perturbing and Protecting a Traceable Block Cipher. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
77Debra L. Cook, Moti Yung, Angelos D. Keromytis The Security of Elastic Block Ciphers Against Key-Recovery Attacks. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Variable-length block ciphers, reduction proof, security analysis, key recovery attacks
76Wen Ji, Lei Hu New Description of SMS4 by an Embedding overGF(28). Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SMS4, ESMS4, XSL algorithm, block cipher, algebraic equation
75Jorge Nakahara Jr. 3D: A Three-Dimensional Block Cipher. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF block cipher design, 3-dimensional state
75Mridul Nandi Fast and Secure CBC-Type MAC Algorithms. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF OMAC, padding rule, prf-security, CBC-MAC
73Olivier Billet, Henri Gilbert A Traceable Block Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Matsumoto-Imai, multivariate cryptology, symmetric cryptology, block ciphers, traitor tracing, collusion resistance
73Meiqin Wang, Jorge Nakahara Jr., Yue Sun Cryptanalysis of the Full MMB Block Cipher. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MMB block cipher, square cryptanalysis, differential cryptanalysis, modular multiplication, linear cryptanalysis
71Dong Hyeon Cheon, Sangjin Lee 0002, Jong In Lim 0001, Sung Jae Lee New Block Cipher DONUT Using Pairwise Perfect Decorrelation. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Differential Cryptanalysis (DC), Linear Cryptanalysis (LC), Block cipher, Decorrelation
70Raphael C.-W. Phan, Mohammad Umar Siddiqi A Framework for Describing Block Cipher Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF framework, cryptanalysis, generalization, Encryption, block ciphers, distinguishers
70Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz OCB: a block-cipher mode of operation for efficient authenticated encryption. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authenticity, cryptography, integrity, standards, encryption, block ciphers, AES, provable security, modes of operation
68Bonwook Koo, Hwan Seok Jang, Jung Hwan Song On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF diffusion layer, SPN, Block cipher, binary matrix
68Yang Xiao 0001, Hsiao-Hwa Chen, Xiaojiang Du, Mohsen Guizani Stream-based cipher feedback mode in wireless error channel. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
68Yuliang Zheng 0001, Tsutomu Matsumoto, Hideki Imai On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
67John Black, Phillip Rogaway A Block-Cipher Mode of Operation for Parallelizable Message Authentication. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
67Debra L. Cook, Moti Yung, Angelos D. Keromytis Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security analysis, differential cryptanalysis, linear cryptanalysis
63Christophe De Cannière Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
62Helger Lipmaa Fast Software Implementations of SC2000. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Block cipher design, large S-boxes, SC2000, fast implementation
61Deukjo Hong, Jaechul Sung, Seokhie Hong, Jongin Lim 0001, Sangjin Lee 0002, Bonseok Koo, Changhoon Lee, Donghoon Chang, Jesang Lee, Kitae Jeong, Hyun Kim, Jongsung Kim, Seongtaek Chee HIGHT: A New Block Cipher Suitable for Low-Resource Device. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Low-Resource Implementation, Block Cipher, Ubiquitous
60Jiali Choy, Huihui Yap Impossible Boomerang Attack for Block Cipher Structures. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Impossible Boomerang Attack, Impossible Boomerang Distinguishers, Block Ciphers
60Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee 0002 Impossible Differential Cryptanalysis for Block Cipher Structures. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
60Haifeng Qian, Zhibin Li 0005, Zhijie Chen, Siman Yang A Practical Optimal Padding for Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
58Yuan-man Tong, Zhiying Wang 0003, Kui Dai, Hongyi Lu Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF WDDL, power analysis resistant, block cipher, design flow, Wave-pipelining
58Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild Distributing the Encryption and Decryption of a Block Cipher. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF thereshold cryptography, block cipher, secret sharing, shared computation
58Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee 0002, Hyungjin Yang, Jongin Lim 0001 A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF CIKS-1(Cipher with Internal Key Scheduling), Block Cipher, Linear Cryptanalysis, Data-Dependent Permutation
58Makoto Sugita, Kazukuni Kobara, Hideki Imai Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Block Cipher Camellia, Truncated Differential Cryptanalysis, Impossible Differential Cryptanalysis
58HyungSo Yoo, ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, IlHwan Park Side Channel Cryptanalysis on SEED. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fault insertion analysis, block cipher, Side channel attack, Differential power analysis, SEED
57Chris Hall, David A. Wagner 0001, John Kelsey, Bruce Schneier Building PRFs from PRPs. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cipher feedback mode, block ciphers, pseudo-random functions, pseudo-random permutations, concrete security
56Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee 0002, Soo Hak Sung Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
56Shoichi Hirose Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF block cipher, black-box model, double-block-length hash function
56Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann Analysis of the SMS4 Block Cipher. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF UFN, cryptanalysis, block ciphers, algebraic structure
55Lei Zhang 0012, Wentao Zhang, Wenling Wu Cryptanalysis of Reduced-Round SMS4 Block Cipher. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SMS4, Differential characteristic, Block cipher, Differential cryptanalysis, Rectangle attack
55Like Chen, Runtong Zhang A Key-dependent Cipher DSDP. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Block cipher algorithm, DSDP structure
55Hitoshi Yanami, Takeshi Shimoyama Differential Cryptanalysis of a Reduced-Round SEED. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF symmetric block cipher, probability, differential attack, characteristic, SEED
55Eric Filiol, Caroline Fontaine A New Ultrafast Stream Cipher Design: COS Ciphers. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF vectorized cipher, high speed encryption, Boolean functions, stream cipher, block cipher, nonlinear feedback shift register
54Paul Crowley Mercy: A Fast Large Block Cipher for Disk Sector Encryption. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF disk sector, large block, avalanche, Mercy home page: http://www.cluefactory.org.uk/paul/mercy/ http://www.cluefactory.org.uk/paul/mercy/, state machine, Feistel cipher
52Sean Murphy An Analysis of SAFER. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF SAFER, Invariant Z -submodules, SAFER, Invariant Z -submodules, Cryptanalysis, Cryptanalysis, Block cipher, Block cipher, Key words
51Devesh C. Jinwala, Dhiren R. Patel, Kankar S. Dasgupta Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Authentication, Encryption, Block Ciphers, Link Layer Security
51Jiqiang Lu Related-key rectangle attack on 36 rounds of the XTEA block cipher. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF XTEA, Block cipher, Related-key rectangle attack
51Peng Zhang, Bing Sun 0001, Chao Li 0002 Saturation Attack on the Block Cipher HIGHT. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF HIGHT, Saturation attack, Block cipher, Distinguisher
51Jiqiang Lu Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF HIGHT, Block cipher, Related-key attack, Impossible differential cryptanalysis, Rectangle attack
51Jiqiang Lu Attacking Reduced-Round Versions of the SMS4 Block Cipher in the Chinese WAPI Standard. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SMS4, Block cipher, Impossible differential cryptanalysis, Rectangle attack
51Mihir Bellare, Phillip Rogaway On the Construction of Variable-Input-Length Ciphers. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Provable Security, Modes of Operation, Symmetric Encryption, Ciphers
51Kazuhiko Minematsu, Yukiyasu Tsunoo Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Differentially-uniform permutation, MAC, Block cipher, AES
51Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman Differential and Linear Cryptanalysis of a Reduced-Round SC2000. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Symmetric block cipher, SC2000, linear attack, probability, differential attack, characteristic
51Lars R. Knudsen, Willi Meier Correlations in RC6 with a Reduced Number of Rounds. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Cipher, Advanced Encryption Standard, RC6
50Raphael C.-W. Phan, Sung-Ming Yen Amplifying Side-Channel Attacks with Techniques from Block Cipher Cryptanalysis. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Attacks and countermeasures in hardware and software, cryptanalysis, Advanced Encryption Standard, side-channel attacks, fault attacks
50Mihir Bellare, Tadayoshi Kohno A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
50Thomas Johansson 0001 Analysis and Design of Modern Stream Ciphers: (Invited Paper) p. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
50Mihir Bellare, Ted Krovetz, Phillip Rogaway Luby-Rackoff Backwards: Increasing Security by Making Block Ciphers Non-invertible. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
50Ewan Fleischmann, Michael Gorski, Stefan Lucks Security of Cyclic Double Block Length Hash Functions. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher based, double-block length, Cyclic-DM, Abreast-DM, cryptographic hash function, ideal cipher model, proof of security
50Nabil M. K. Mirza, Ziad Osman, Rached N. Zantout, Mohamed El-Sayed 0005 Error Correction of Noisy Block Cipher Using Cipher and Plaintext Characteristics. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Cipher, AES, Error Correction
49Debra L. Cook, Angelos D. Keromytis, Moti Yung Elastic block ciphers: the basic design. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF elastic block ciphers, variable-length block ciphers, encryption, block ciphers
49Moses D. Liskov, Ronald L. Rivest, David A. Wagner 0001 Tweakable Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF tweakable block ciphers, initialization vector, block ciphers, modes of operation
48Florian Mendel, Thomas Peyrin, Christian Rechberger, Martin Schläffer Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF semi-free-start collision, known-key distinguisher, cryptanalysis, block cipher, hash function
48Jaeyoung Yi, Karam Park, Joonseok Park, Won Woo Ro Fully Pipelined Hardware Implementation of 128-Bit SEED Block Cipher Algorithm. Search on Bibsonomy ARC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Cipher Algorithm, Field Programmable Gate Arrays (FPGA), Cryptography, SEED
48Maryam Izadi, Babak Sadeghiyan, Seyed Saeed Sadeghian, Hossein Arabnezhad Khanooki MIBS: A New Lightweight Block Cipher. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Low-cost RFID Tags, Block Cipher, Lightweight, Resource-Constrained Devices
48Yongjin Yeom, Yongkuk Cho, Moti Yung High-Speed Implementations of Block Cipher ARIA Using Graphics Processing Units. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF GPU, implementation, block cipher, GPGPU, Graphics Processor, ARIA
48Dai Yamamoto, Jun Yajima, Kouichi Itoh A Very Compact Hardware Implementation of the MISTY1 Block Cipher. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MISTY1, Compact Implementation, Block cipher, Hardware, ASIC
48Toshihiko Matsuo, Kaoru Kurosawa On Parallel Hash Functions Based on Block-Cipher. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block cipher, hash function
48Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee 0002 Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cobra-S128, Cobra-F64, Block Cipher, Related-Key Attack, Data-Dependent Permutation
48YongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee 0002 Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Differential-Linear Type Attacks, SHACAL-2, Block Cipher
48Jongsung Kim, Seokhie Hong, Sangjin Lee 0002, Jung Hwan Song, Hyungjin Yang Truncated Differential Attacks on 8-Round CRYPTON. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Truncated Differential Attack, CRYPTON, Block Cipher
48Ulrich Kühn 0001 Improved Cryptanalysis of MISTY1. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Slicing Attack, Cryptanalysis, Block cipher, Impossible Differential
47Yalei Cui, Zibin Dai The Research of NULL Convention Logic Circuit Computing Model Targeted at Block Cipher Processing. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
47Zheng Gong, Xuejia Lai, Kefei Chen A synthetic indifferentiability analysis of some block-cipher-based hash functions. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AMS Classifications 68W40, 68Q25
47Huiju Cheng, Howard M. Heys, Cheng Wang PUFFIN: A Novel Compact Block Cipher Targeted to Embedded Digital Systems. Search on Bibsonomy DSD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
47Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, C. Vikkelsoe PRESENT: An Ultra-Lightweight Block Cipher. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Katsuyuki Okeya Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF (keyed) hash function, PGV construction, reverse DPA, side channel attacks, differential power analysis (DPA), HMAC
47Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii, Hidema Tanaka The Block Cipher SC2000. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
47Willi Meier On the Security of the IDEA Block Cipher. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
47Ewan Fleischmann, Michael Gorski, Stefan Lucks On the Security of Tandem-DM. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher based, double-block length, Tandem-DM, Cryptographic hash function, ideal cipher model, proof of security
47Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee 0002 Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CIKS-128, CIKS-128H, Related-Key Differential Attack, Block Cipher, Data-Dependent Operation
47Rüdiger Weis, Stefan Lucks Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers. Search on Bibsonomy ECMAST The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Luby-Rackoff ciphers, BEAR, LION, BEAST, JAVA, Performance, block cipher
46Stefan Lucks On Security of the 128-Bit Block Cipher DEAL. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
46Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram Efficient Constructions of Variable-Input-Length Block Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Adam J. Elbirt, Christof Paar An Instruction-Level Distributed Processor for Symmetric-Key Cryptography. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF algorithm-agility, FPGA, Cryptography, VHDL, block cipher
45Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang, Meiqin Wang Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF linear hulls, algebraic analysis, systems of sparse polynomial equations of low degree, RFID, block ciphers
44Christophe Petit 0001, François-Xavier Standaert, Olivier Pereira, Tal Malkin, Moti Yung A block cipher based pseudo random number generator secure against side-channel key recovery. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
44Pascal Junod, Marco Macchetti Revisiting the IDEA Philosophy. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IDEA block cipher, WIDEA compression function, Intel Core2 CPU, wordslice implementation
44Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman Related-Key Rectangle Attack on 42-Round SHACAL-2. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SHACAL-2, Block cipher, Differential cryptanalysis, Related-key rectangle attack
44Louis Granboulan, Éric Levieil, Gilles Piret Pseudorandom Permutation Families over Abelian Groups. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF arbitrary domain, differential and linear cryptanalysis, block cipher
44Jiqiang Lu, Jongsung Kim, Nathan Keller, Orr Dunkelman Differential and Rectangle Attacks on Reduced-Round SHACAL-1. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SHACAL-1, Amplified boomerang attack, Block cipher, Differential cryptanalysis, Rectangle attack
44Raphael Chung-Wei Phan, Bok-Min Goi On the Security Bounds of CMC, EME, EME+ and EME* Modes of Operation. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF tweakable schemes, disk encryption, security bounds, Block cipher, modes of operation, distinguisher
44François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF block cipher design, side-channel resistance, reconfigurable hardware, efficient implementations
44Kaoru Kurosawa, Tetsu Iwata TMAC: Two-Key CBC MAC. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block cipher, provable security, CBC MAC
44Amr M. Youssef, Guang Gong On the Interpolation Attacks on Block Ciphers. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF interpolation attack, Galois Field Fourier Transform, cryptanalysis, Block cipher, finite fields
43Lan Luo, Zhiguang Qin, Shijie Zhou A Comment to the Intelligent Functions of Different Weight Ciphers. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Charanjit S. Jutla Encryption Modes with Almost Free Message Integrity. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pairwise independent, Parallelizable, Authentication, Encryption, Block ciphers
43Xu Guo 0001, Zhimin Chen 0002, Patrick Schaumont Energy and Performance Evaluation of an FPGA-Based SoC Platform with AES and PRESENT Coprocessors. Search on Bibsonomy SAMOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Éliane Jaulmes, Antoine Joux, Frédéric Valette On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
43Ermaliza Razali, Raphael C.-W. Phan, Marc Joye On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pseudorandom permutation (PRP), key recovery (KR), related key attacks (RKA), block cipher, Provable security
41Lu Xiao 0003, Howard M. Heys Hardware Performance Characterization of Block Cipher Structures. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1403 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license