The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase block-ciphers (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1992 (17) 1993-1996 (20) 1997-1998 (36) 1999-2000 (40) 2001 (25) 2002 (25) 2003 (36) 2004 (47) 2005 (38) 2006 (52) 2007 (47) 2008 (57) 2009 (50) 2010 (25) 2011 (18) 2012 (41) 2013 (40) 2014 (38) 2015 (47) 2016 (37) 2017 (54) 2018 (47) 2019 (42) 2020 (62) 2021 (34) 2022 (42) 2023 (46) 2024 (7)
Publication types (Num. hits)
article(442) book(1) incollection(13) inproceedings(578) phdthesis(36)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 634 occurrences of 233 keywords

Results
Found 1070 publication records. Showing 1070 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
145Nicolas T. Courtois The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF interpolation attack on block ciphers, fractional transformations, homographic functions, generalised linear cryptanalysis, bi-linear cryptanalysis, Block ciphers, AES, Rijndael, Feistel ciphers, multivariate equations
116Moses D. Liskov, Ronald L. Rivest, David A. Wagner 0001 Tweakable Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF tweakable block ciphers, initialization vector, block ciphers, modes of operation
115James L. Massey, Ueli M. Maurer, Muzhong Wang Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
108Debra L. Cook, Moti Yung, Angelos D. Keromytis Elastic block ciphers: method, security and instantiations. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Elastic block ciphers, Variable-length block ciphers, Reduction proof, Security analysis, Key recovery attacks
84Debra L. Cook, Angelos D. Keromytis, Moti Yung Elastic block ciphers: the basic design. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF elastic block ciphers, variable-length block ciphers, encryption, block ciphers
80Johann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann 0007, Marcel Medwed Energy evaluation of software implementations of block ciphers under memory constraints. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF energy optimization, code size reduction, symmetric cipher, lightweight cryptography, memory footprint
79Nicolas T. Courtois, Josef Pieprzyk Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MQ problem, overdefined systems of multivariate equations, Gröbner bases, sparse multivariate polynomials, Multivariate Cryptanalysis, Block ciphers, AES, Rijndael, Square, Camellia, Serpent, XL algorithm, multivariate quadratic equations
77Debra L. Cook, Moti Yung, Angelos D. Keromytis The Security of Elastic Block Ciphers Against Key-Recovery Attacks. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Variable-length block ciphers, reduction proof, security analysis, key recovery attacks
77Christophe De Cannière, Orr Dunkelman, Miroslav Knezevic KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
77Shoichi Hirose Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
77Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck CryptoGraphics: Secret Key Cryptography Using Graphics Cards. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Graphics Processing Unit, Stream Ciphers, Block Ciphers, AES
76Pawel Chodowiec, Po Khuon, Kris Gaj Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining. Search on Bibsonomy FPGA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF fast architectures, secret-key ciphers, pipelining, AES
76Thomas Jakobsen, Lars R. Knudsen The Interpolation Attack on Block Ciphers. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
72Thomas Johansson 0001 Analysis and Design of Modern Stream Ciphers: (Invited Paper) p. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
72Jovan Dj. Golic Modes of Operation of Stream Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF keyed hash functions, security, Stream ciphers, block ciphers, hash functions, conversions
71Jorge Nakahara Jr. Faster Variants of the MESH Block Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF byte-oriented block ciphers, smart cards, algebraic attacks, IDEA
69Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002, Dukjae Moon Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cobra-H64, Cobra-H128, Block Ciphers, Related-Key Attacks, Data-Dependent Permutations
69Nicolas T. Courtois General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF polynomial relations, design of cryptographic primitives, generalised linear cryptanalysis, multivariate public key encryption and signature schemes, Quartz, combiners with memory, elimination methods, Gröbner bases, Boolean functions, stream ciphers, block ciphers, AES, finite fields, algebraic attacks, Rijndael, Serpent, HFE, Sflash, multivariate equations
68Souradyuti Paul, Bart Preneel On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
67Adam J. Elbirt, Christof Paar Instruction-Level Distributed Processing for Symmetric-Key Cryptography. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF algorithm-agility, FPGA, cryptography, VHDL, block cipher
66Ermaliza Razali, Raphael C.-W. Phan, Marc Joye On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pseudorandom permutation (PRP), key recovery (KR), related key attacks (RKA), block cipher, Provable security
66Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel A New Approach to chi2 Cryptanalysis of Block Ciphers. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ? 2, square and linear cryptanalysis, Block ciphers
64Raphael C.-W. Phan, Mohammad Umar Siddiqi A Framework for Describing Block Cipher Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF framework, cryptanalysis, generalization, Encryption, block ciphers, distinguishers
63Pascal Junod, Serge Vaudenay FOX : A New Family of Block Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Lai-Massey scheme, Block ciphers
63Alex Biryukov, Christophe De Cannière Block Ciphers and Systems of Quadratic Equations. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Khazad, Misty, Block ciphers, linearization, Rijndael, Camellia, Serpent, multivariate quadratic equations
61Debra L. Cook, Moti Yung, Angelos D. Keromytis Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security analysis, differential cryptanalysis, linear cryptanalysis
60Jorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle The MESH Block Ciphers. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
58Adam J. Elbirt, Christof Paar An Instruction-Level Distributed Processor for Symmetric-Key Cryptography. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF algorithm-agility, FPGA, Cryptography, VHDL, block cipher
58Jovan Dj. Golic DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Keyed reversible circuits, data scrambling, probing attacks, block ciphers, power analysis, countermeasures
58Helger Lipmaa IDEA: A Cipher For Multimedia Architectures? Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF multimedia architectures, Pentium MMX, block ciphers, IDEA, fast implementations
57Johannes Buchmann 0001, Andrei Pyshkin, Ralf-Philipp Weinmann Block Ciphers Sensitive to Gröbner Basis Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
55Lan Luo, Zhiguang Qin, Shijie Zhou A Comment to the Intelligent Functions of Different Weight Ciphers. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
54Nicolas T. Courtois, Blandine Debraize Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF algebraic attacks on block ciphers, Gröbner bases, design of S-boxes, Rijndael, algebraic immunity, Serpent, multivariate equations
53Rüdiger Weis, Stefan Lucks Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers. Search on Bibsonomy ECMAST The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Luby-Rackoff ciphers, BEAR, LION, BEAST, JAVA, Performance, block cipher
52Lars R. Knudsen, David A. Wagner 0001 Integral Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MISTY, integrals, Cryptanalysis, block ciphers
52Anne Canteaut, Marion Videau Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF higher order differential cryptanalysis, Boolean functions, Block ciphers, nonlinearity
52Keke Wu, Huiyun Li, Bo Peng, Fengqi Yu Correlation Power Analysis Attack against Synchronous Stream Ciphers. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Onur Özen, Kerem Varici, Cihangir Tezcan, Çelebi Kocair Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hight, Impossible Differential Attack, Present, Related-Key Attack, Rectangle Attack
51Olivier Billet, Henri Gilbert A Traceable Block Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Matsumoto-Imai, multivariate cryptology, symmetric cryptology, block ciphers, traitor tracing, collusion resistance
50Xuejia Lai, James L. Massey, Sean Murphy Markov Ciphers and Differential Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
49Yassin M. Hasan, Hesham A. Abulenein Key-linked block ciphers with input-output shuffling applied to remotely keyed encryption. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
49Helen Gustafson, Ed Dawson, William J. Caelli Comparison of Block Ciphers. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
47Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson Bit-Pattern Based Integral Attack. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integral cryptanalysis, Noekeon, Block ciphers, present, Serpent
46Orr Dunkelman, Nathan Keller A New Criterion for Nonlinearity of Block Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Xuejia Lai, James L. Massey Hash Function Based on Block Ciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
46Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin On Compression of Data Encrypted with Block Ciphers. Search on Bibsonomy DCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46Alexander Klimov, Adi Shamir New Applications of T-Functions in Block Ciphers and Hash Functions. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Jiali Choy, Huihui Yap Impossible Boomerang Attack for Block Cipher Structures. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Impossible Boomerang Attack, Impossible Boomerang Distinguishers, Block Ciphers
45Charanjit S. Jutla Encryption Modes with Almost Free Message Integrity. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pairwise independent, Parallelizable, Authentication, Encryption, Block ciphers
45Chris Hall, David A. Wagner 0001, John Kelsey, Bruce Schneier Building PRFs from PRPs. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cipher feedback mode, block ciphers, pseudo-random functions, pseudo-random permutations, concrete security
44Ju-Sung Kang, Seongtaek Chee, Choonsik Park A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF (probabilistic) higher order differential attack, two-block structure, provable security, LC, DC
44Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram Efficient Constructions of Variable-Input-Length Block Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
44Bart Preneel, René Govaerts, Joos Vandewalle Hash Functions Based on Block Ciphers: A Synthetic Approach. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
44Danilo Gligoroski, Suzana Andova, Svein J. Knapskog On the Importance of the Key Separation Principle for Different Modes of Operation. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF quasigroup string transformations, block ciphers, modes of operation
44Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee 0002, Dowon Hong The Related-Key Rectangle Attack - Application to SHACAL-1. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF The Rectangle Attack, The Related-Key Attack, The Related-Key Rectangle Attack, SHACAL-1, Block Ciphers
44Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee 0002, Dowon Hong Padding Oracle Attacks on Multiple Modes of Operation. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Padding oracle attacks, Multiple modes of operation, Block ciphers
44Shai Halevi, Don Coppersmith, Charanjit S. Jutla Scream: A Software-Efficient Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Round functions, Stream ciphers, Block ciphers, SEAL
44Alex Biryukov, Adi Shamir Structural Cryptanalysis of SASAS. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Structural cryptanalysis, substitution permutation networks, substitution affine networks, Cryptanalysis, block ciphers, Rijndael
44Eli Biham Cryptanalysis of Multiple Modes of Operation. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Block ciphers, Block ciphers, Modes of operation, Modes of operation, Key words, Multiple modes, Multiple modes
44Lars R. Knudsen, Xuejia Lai, Bart Preneel Attacks on Fast Double Block Length Hash Functions. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Cryptanalysis, Cryptanalysis, Block ciphers, Block ciphers, Key words, Cryptographic hash functions, Cryptographic hash functions, Birthday attacks, Birthday attacks, Double block length hash functions, Double block length hash functions
44Ivan Damgård, Lars R. Knudsen Two-Key Triple Encryption. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF The Data Encryption Standard, The Data Encryption Standard, Block ciphers, Block ciphers, Pseudorandom generators, Pseudorandom generators, Key words, Multiple encryption, Multiple encryption
44Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten Differential Power Analysis of Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain
44Don Coppersmith, Shai Halevi, Charanjit S. Jutla Cryptanalysis of Stream Ciphers with Linear Masking. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Linear masking, Low-Diffusion attacks, Stream ciphers, Hypothesis testing, Linear cryptanalysis
44Alex Biryukov, Adi Shamir Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF time/memory tradeoff attacks, Cryptanalysis, stream ciphers
44Orr Dunkelman, Nathan Keller A New Criterion for Nonlinearity of Block Ciphers. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
44Howard M. Heys Analysis of the Statistical Cipher Feedback Mode of Block Ciphers. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block cipher modes, Cryptography, synchronization, stream ciphers, error propagation
44Ramesh Karri, Grigori Kuznetsov, Michael Gössel Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
42Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee 0002, Soo Hak Sung Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
42Lars R. Knudsen, Bart Preneel Fast and Secure Hashing Based on Codes. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
41Charlie Obimbo, Behzad Salami 0002 A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. Search on Bibsonomy J. Supercomput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Inverse of a matrix, Row-echelon reduction, Parallel Algorithms, Cryptography, Block Ciphers, Modular arithmetic, Systems of linear equations
41Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater Improving the Time Complexity of Matsui's Linear Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fast Fourier Transform, block ciphers, linear cryptanalysis
41Claude Carlet Concatenating Indicators of Flats for Designing Cryptographic Functions. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF stream and block ciphers, Boolean functions
41Serge Vaudenay Decorrelation: A Theory for Block Cipher Security. Search on Bibsonomy J. Cryptol. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block ciphers, Pseudorandomness
41Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen GEM: A Generic Chosen-Ciphertext Secure Encryption Method. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF generic conversion, stream ciphers, block ciphers, Public-key encryption, random oracle model, chosen-ciphertext security, hybrid encryption
41Joan Daemen, René Govaerts, Joos Vandewalle A Hardware Design Model for Cryptographic Algorithms. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Hardware Cryptography, Pseudorandom Sequence Generators, Stream Ciphers, Block Ciphers, Cryptographic Hash Functions
41Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Aroor Dinesh Dileep, Chellu Chandra Sekhar Identification of Block Ciphers using Support Vector Machines. Search on Bibsonomy IJCNN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Creighton T. R. Hager, Scott F. Midkiff, Jung-Min Park 0001, Thomas L. Martin Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants. Search on Bibsonomy PerCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Pascal Junod, Serge Vaudenay Perfect Diffusion Primitives for Block Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Akashi Satoh, Sumio Morioka Unified Hardware Architecture for 128-Bit Block Ciphers AES and Camellia. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Lars R. Knudsen Contemporary Block Ciphers. Search on Bibsonomy Lectures on Data Security The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
41Gary Carter, Ed Dawson, Lauren Nielsen Key Schedules of Iterative Block Ciphers. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
41Serge Vaudenay Provable Security for Block Ciphers by Decorrelation. Search on Bibsonomy STACS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
40Yee Wei Law, Jeroen Doumen, Pieter H. Hartel Survey and benchmark of block ciphers for wireless sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Sensor networks, cryptography, energy efficiency, block ciphers
40Anh Duc Duong, Minh-Triet Tran, Luong Han Co The Extended Rijndael-like Block Ciphers. Search on Bibsonomy ITCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Rijndael Block Cipher, Extended Rijndael-like Block Ciphers, Advanced Encryption Standard
39Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury Cellular Automata : An Ideal Candidate for a Block Cipher. Search on Bibsonomy ICDCIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cycle Structure, Self-invertibility, Cellular Automata, Block Ciphers, Non-linearity
39Nikhil Joshi, Jayachandran Sundararajan, Kaijie Wu 0001, Bo Yang 0010, Ramesh Karri Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Subsitution Permutation Networks (SPN), ANUBIS, TwoFish, cryptography, Concurrent Error Detection (CED), tamper proofing, Feistel networks
39Imran Erguler, Emin Anarim A New Cryptanalytic Time-Memory Trade-Off for Stream Ciphers. Search on Bibsonomy ISCIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Yevgeniy Dodis, John P. Steinberger Message Authentication Codes from Unpredictable Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
38Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya A New Mode of Operation for Block Ciphers and Length-Preserving MACs. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Ermaliza Razali, Raphael C.-W. Phan On the Existence of Related-Key Oracles in Cryptosystems Based on Block Ciphers. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38Yuliang Zheng 0001, Tsutomu Matsumoto, Hideki Imai On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
38Gilles Piret, François-Xavier Standaert Provable security of block ciphers against linear cryptanalysis: a mission impossible? Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A60
38Yassin M. Hasan From stream to provably secure block ciphers based on pseudorandom matrix transformations. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Eli Biham, Orr Dunkelman, Nathan Keller New Combined Attacks on Block Ciphers. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
38Akashi Satoh, Sumio Morioka Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
38Valér Canda, Tran van Trung, Spyros S. Magliveras, Tamás Horváth 0002 Symmetric Block Ciphers Based on Group Bases. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
38Richard Cleve Complexity Theoretic Issues Concerning Block Ciphers Related to D.E.S. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
37Yaobin Shen, François-Xavier Standaert Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
37Yaobin Shen, François-Xavier Standaert Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1070 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license