Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
152 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
HCTR: A Variable-Input-Length Enciphering Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 175-188, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
disk sector encryption, modes of operation, symmetric encryption, Blockcipher, tweakable blockcipher |
136 | John Black, Martin Cochran, Thomas Shrimpton |
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 22(3), pp. 311-329, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Blockcipher-based hash functions, Provable security, Ideal-cipher model, Tweakable blockciphers, Collision-resistant hash functions |
117 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
On the Security of Tweakable Modes of Operation: TBC and TAE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 8th International Conference, ISC 2005, Singapore, September 20-23, 2005, Proceedings, pp. 274-287, 2005, Springer, 3-540-29001-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
modes of operation, authenticated encryption, symmetric encryption, Blockcipher, tweakable blockcipher |
112 | John Black, Martin Cochran, Thomas Shrimpton |
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings, pp. 526-541, 2005, Springer, 3-540-25910-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
provable security, tweakable blockciphers, Collision-resistant hash functions |
87 | Phillip Rogaway |
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 16-31, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
83 | Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata |
The 128-Bit Blockcipher CLEFIA (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers, pp. 181-195, 2007, Springer, 978-3-540-74617-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
generalized Feistel structure, DSM, blockcipher, CLEFIA |
82 | Peng Wang 0009, Dengguo Feng, Wenling Wu, Liting Zhang |
On the Unprovable Security of 2-Key XCBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 230-238, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Blockcipher mode of operation, Provable security, Message authentication code, Related-key attack, Blockcipher |
82 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 280-286, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
nonce-based encryption, security model, modes of operation, Blockcipher, tweakable blockcipher |
77 | Martijn Stam |
Blockcipher-Based Hashing Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 67-83, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
77 | John Black |
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers, pp. 328-340, 2006, Springer, 3-540-36597-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Information-Theoretic Cryptography, Uninstantiability, Random-Oracle Model, Ideal-Cipher Model |
60 | Tetsu Iwata |
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers, pp. 310-327, 2006, Springer, 3-540-36597-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Tetsu Iwata, Kan Yasuda |
BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 313-330, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Bivariate, random-until-bad game, systematic proof, universal hash function, counter mode |
52 | Tetsu Iwata, Kan Yasuda |
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 394-415, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SIV, Universal hash function, security proof, counter mode |
52 | Kazuhiko Minematsu, Toshiyasu Matsushima |
Tweakable Enciphering Schemes from Hash-Sum-Expansion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 252-267, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
HCTR, HCH, Weak Pseudorandom Function, Mode of operation |
49 | Kazuhiko Minematsu |
Building blockcipher from small-block tweakable blockcipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 74(3), pp. 645-663, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
49 | Kazuhiko Minematsu, Tetsu Iwata |
Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding - 13th IMA International Conference, IMACC 2011, Oxford, UK, December 12-15, 2011. Proceedings, pp. 391-412, 2011, Springer, 978-3-642-25515-1. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
42 | Jean-Philippe Aumasson, Raphael C.-W. Phan |
How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings, pp. 308-324, 2008, Springer, 978-3-540-68159-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
42 | Henri Gilbert, Marine Minier |
New Results on the Pseudorandomness of Some Blockcipher Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers, pp. 248-266, 2001, Springer, 3-540-43869-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
42 | Cees J. A. Jansen, Dick E. Boekee |
Modes of Blockcipher Algorithms and their Protection Against Active Eavesdropping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings, pp. 281-286, 1987, Springer, 3-540-19102-X. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
41 | Tetsu Iwata |
Authenticated Encryption Mode for Beyond the Birthday Bound Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings, pp. 125-142, 2008, Springer, 978-3-540-68159-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
birthday bound, modes of operation, authenticated encryption, security proofs, Blockcipher |
41 | Taizo Shirai, Kyoji Shibutani |
On Feistel Structures Using a Diffusion Switching Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers, pp. 41-56, 2006, Springer, 3-540-36597-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Feistel structure, optimal diffusion mappings, blockcipher |
35 | Jesang Lee, Seokhie Hong, Jaechul Sung, Haeryong Park |
A New Double-Block-Length Hash Function Using Feistel Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 11-20, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Block Ciphers, Hash Function, Double Block Length Hash Function |
35 | Onur Özen, Martijn Stam |
Another Glance at Double-Length Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings, pp. 176-201, 2009, Springer, 978-3-642-10867-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Ben Morris, Phillip Rogaway, Till Stegers |
How to Encipher Messages on a Small Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 286-302, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
35 | Mridul Nandi |
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 350-362, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
online cipher, CBC, universal hash function, random permutation |
35 | John P. Steinberger |
The Collision Intractability of MDC-2 in the Ideal-Cipher Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings, pp. 34-51, 2007, Springer, 978-3-540-72539-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Collision-resistant hashing, MDC-2, cryptographic hash functions, ideal-cipher model |
35 | Jan-Hendrik Evertse |
Linear Structures in Blockciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings, pp. 249-266, 1987, Springer, 3-540-19102-X. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
25 | Munawar Hasan, Donghoon Chang |
Lynx: Family of Lightweight Authenticated Encryption Schemes Based on Tweakable Blockcipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(8), pp. 14357-14369, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
25 | Zhongliang Zhang, Zhen Qin, Chun Guo 0002 |
Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 91(3), pp. 1035-1052, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Munawar Hasan, Donghoon Chang |
Lynx: Family of Lightweight Authenticated Encryption Schemes based on Tweakable Blockcipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 241, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
25 | Yuqing Zhao, Chun Guo 0002 |
Towards Minimizing Tweakable Blockcipher-Based Generalized Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT (1) ![In: Progress in Cryptology - INDOCRYPT 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part I, pp. 111-133, 2023, Springer, 978-3-031-56231-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
25 | Viet Tung Hoang, Cong Wu, Xin Yuan 0001 |
Faster Yet Safer: Logging System Via Fixed-Key Blockcipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 841, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
25 | Viet Tung Hoang, Cong Wu, Xin Yuan 0001 |
Faster Yet Safer: Logging System Via Fixed-Key Blockcipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 31st USENIX Security Symposium, USENIX Security 2022, Boston, MA, USA, August 10-12, 2022, pp. 2389-2406, 2022, USENIX Association, 978-1-939133-31-1. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
25 | Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi |
Blockcipher-Based Authenticated Encryption: How Small Can We Go? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 33(3), pp. 703-741, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
25 | Zhenzhen Bao, Jian Guo 0001, Tetsu Iwata, Kazuhiko Minematsu |
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 600, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
25 | Yusuke Naito 0001, Mitsuru Matsui, Takeshi Sugawara 0001, Daisuke Suzuki |
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 700, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
25 | Zhenzhen Bao, Jian Guo 0001, Tetsu Iwata, Kazuhiko Minematsu |
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2019(2), pp. 1-54, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Hiroki Sato, Mamoru Mimura, Hidema Tanaka |
Analysis of Division Property using MILP Method for Lightweight Blockcipher Piccolo. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaJCIS ![In: 14th Asia Joint Conference on Information Security, AsiaJCIS 2019, Kobe, Japan, August 1-2, 2019, pp. 48-55, 2019, IEEE. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
25 | Jooyoung Lee 0001, Atul Luykx, Bart Mennink, Kazuhiko Minematsu |
Connecting tweakable and multi-key blockcipher security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 86(3), pp. 623-640, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Yusuke Naito 0001, Mitsuru Matsui, Takeshi Sugawara 0001, Daisuke Suzuki |
SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(2), pp. 192-217, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
25 | Elena Andreeva 0001, Reza Reyhanitabar, Kerem Varici, Damian Vizár |
Forking a Blockcipher for Authenticated Encryption of Very Short Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 916, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
25 | Jiageng Chen, Rashed Mazumder, Atsuko Miyaji, Chunhua Su |
Variable message encryption through blockcipher compression function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Concurr. Comput. Pract. Exp. ![In: Concurr. Comput. Pract. Exp. 29(7), 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Fanbao Liu, Fengmei Liu |
Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 653, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
25 | Yusuke Naito 0001 |
Blockcipher-based MACs: Beyond the Birthday Bound without Message Length. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 852, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
25 | Bart Mennink, Samuel Neves |
Optimal PRFs from Blockcipher Designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 812, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
25 | Bart Mennink |
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 474, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
25 | Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi |
Blockcipher-based Authenticated Encryption: How Small Can We Go? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 649, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
25 | Bart Mennink, Samuel Neves |
Optimal PRFs from Blockcipher Designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2017(3), pp. 228-252, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Yusuke Naito 0001 |
Blockcipher-Based MACs: Beyond the Birthday Bound Without Message Length. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (3) ![In: Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III, pp. 446-470, 2017, Springer, 978-3-319-70699-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Bart Mennink |
Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (2) ![In: Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part II, pp. 708-732, 2017, Springer, 978-3-319-63714-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi |
Blockcipher-Based Authenticated Encryption: How Small Can We Go? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings, pp. 277-298, 2017, Springer, 978-3-319-66786-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
25 | Rashed Mazumder, Atsuko Miyaji |
A New Scheme of Blockcipher Hash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Inf. Syst. ![In: IEICE Trans. Inf. Syst. 99-D(4), pp. 796-804, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Thomas Shrimpton, R. Seth Terashima |
Salvaging Weak Security Bounds for Blockcipher-Based Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 864, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
25 | Rashed Mazumder, Atsuko Miyaji, Chunhua Su |
A Blockcipher Based Authentication Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CD-ARES ![In: Availability, Reliability, and Security in Information Systems - IFIP WG 8.4, 8.9, TC 5 International Cross-Domain Conference, CD-ARES 2016, and Workshop on Privacy Aware Machine Learning for Health Data Science, PAML 2016, Salzburg, Austria, August 31 - September 2, 2016, Proceedings, pp. 106-123, 2016, Springer, 978-3-319-45506-8. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Thomas Shrimpton, R. Seth Terashima |
Salvaging Weak Security Bounds for Blockcipher-Based Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I, pp. 429-454, 2016, 978-3-662-53886-9. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
25 | Yiyuan Luo, Xuejia Lai, Tiejun Jia |
Attacks on a double length blockcipher-based hash proposal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptogr. Commun. ![In: Cryptogr. Commun. 7(3), pp. 289-295, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
25 | Nilanjan Datta, Mridul Nandi |
Equivalence between MAC, WCR and PRF for Blockcipher Based Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings, pp. 300-308, 2014, Springer, 978-3-319-12474-2. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Wenyang Liu, Xiaomin Wang, Wenfang Zhang, Xianfeng Guo |
A lightweight blockcipher based on chaotic maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISBAST ![In: 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, Kuala Lumpur, Malaysia, August 26-27, 2014, pp. 150-155, 2014, IEEE, 978-1-4799-6444-4. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Atsuko Miyaji, Mazumder Rashed, Tsuyoshi Sawada |
A New (n, n) Blockcipher Hash Function: Apposite for Short Messages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaJCIS ![In: Ninth Asia Joint Conference on Information Security, AsiaJCIS 2014, Wuhan, China, September 3-5, 2014, pp. 56-63, 2014, IEEE Computer Society, 978-1-4799-5733-0. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
25 | Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway |
Efficient Garbling from a Fixed-Key Blockcipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 426, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
25 | Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam |
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 350, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
25 | Nilanjan Datta, Mridul Nandi |
Equivalence between MAC and PRF for Blockcipher based Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2013, pp. 575, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
25 | Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam |
Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings, pp. 426-443, 2013, Springer, 978-3-642-38347-2. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Hidenori Kuwakado, Shoichi Hirose |
Hashing Mode Using a Lightweight Blockcipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding - 14th IMA International Conference, IMACC 2013, Oxford, UK, December 17-19, 2013. Proceedings, pp. 213-231, 2013, Springer, 978-3-642-45238-3. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Kazuhiko Minematsu |
A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings, pp. 221-238, 2013, Springer, 978-3-642-41226-4. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway |
Efficient Garbling from a Fixed-Key Blockcipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 2013 IEEE Symposium on Security and Privacy, SP 2013, Berkeley, CA, USA, May 19-22, 2013, pp. 478-492, 2013, IEEE Computer Society, 978-1-4673-6166-8. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
25 | Ewan Fleischmann |
Analysis and Design of Blockcipher Based Cryptographic Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2013 |
RDF |
|
25 | Masanobu Katagi, Shiho Moriai |
The 128-Bit Blockcipher CLEFIA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 6114, pp. 1-33, March 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Yiyuan Luo, Xuejia Lai |
Attacks On a Double Length Blockcipher-based Hash Proposal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2011, pp. 238, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
25 | Yusuke Naito 0001 |
Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers, pp. 338-355, 2011, Springer, 978-3-642-28495-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Toru Akishita, Harunaga Hiwatari |
Very Compact Hardware Implementations of the Blockcipher CLEFIA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography - 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers, pp. 278-292, 2011, Springer, 978-3-642-28495-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Donghoon Chang, Mridul Nandi, Moti Yung |
On the Security of Hash Functions Employing Blockcipher Postprocessing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers, pp. 146-166, 2011, Springer, 978-3-642-21701-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida |
Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers, pp. 346-364, 2011, Springer, 978-3-642-31911-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | Kyoji Shibutani, Takanori Isobe 0001, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, Taizo Shirai |
Piccolo: An Ultra-Lightweight Blockcipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings, pp. 342-357, 2011, Springer, 978-3-642-23950-2. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
25 | John Black, Phillip Rogaway, Thomas Shrimpton, Martijn Stam |
An Analysis of the Blockcipher-Based Hash Functions from PGV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 23(4), pp. 519-545, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Yusuke Naito 0001 |
Blockcipher-based Double-length Hash Functions for Pseudorandom Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 566, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
25 | Mridul Nandi |
A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 14, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
25 | Donghoon Chang, Mridul Nandi, Moti Yung |
On the Security of Hash Functions Employing Blockcipher Postprocessing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 629, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
25 | Yiyuan Luo, Xuejia Lai |
More Insights on Blockcipher-Based Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2010, pp. 642, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
25 | Mridul Nandi |
A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers, pp. 212-229, 2010, Springer, 978-3-642-13857-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
25 | Martijn Stam |
Blockcipher Based Hashing Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 71, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
25 | Charlie Obimbo, Behzad Salami 0002 |
A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 39(2), pp. 113-130, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Inverse of a matrix, Row-echelon reduction, Parallel Algorithms, Cryptography, Block Ciphers, Modular arithmetic, Systems of linear equations |
25 | John Black, Martin Cochran, Thomas Shrimpton |
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 223, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
25 | Tetsu Iwata |
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2006, pp. 188, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
25 | Martin Stanek |
Analysis of Fast Blockcipher-Based Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 426-435, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Hash functions, provable security, black-box model |
25 | John Black |
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2005, pp. 210, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
25 | John Black, Martin Cochran, Thomas Shrimpton |
On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 62, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
24 | Atsushi Mitsuda, Tetsu Iwata |
Tweakable Pseudorandom Permutation from Generalized Feistel Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 22-37, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Luby-Rackoff theory, generalized Feistel structure, security proofs, tweakable blockcipher |
24 | Phillip Rogaway, John P. Steinberger |
Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 433-450, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
blockcipher-based hashing, collision-resistant hashing, cryptographic hash functions, compression functions, ideal-cipher model |
17 | Peter Gazi, Ueli M. Maurer |
Cascade Encryption Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings, pp. 37-51, 2009, Springer, 978-3-642-10365-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cascade encryption, random system, indistinguishability, ideal cipher model |
17 | Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill |
Order-Preserving Symmetric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings, pp. 224-241, 2009, Springer, 978-3-642-01000-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Martijn Stam |
Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 397-412, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Thomas Ristenpart, Thomas Shrimpton |
How to Build a Hash Function from Any Collision-Resistant Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 147-163, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu |
On Tweaking Luby-Rackoff Blockciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings, pp. 342-356, 2007, Springer, 978-3-540-76899-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Phillip Rogaway, Thomas Shrimpton |
A Provable-Security Treatment of the Key-Wrap Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings, pp. 373-390, 2006, Springer, 3-540-34546-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
17 | Henri Gilbert |
The Security of "One-Block-to-Many" Modes of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 10th International Workshop, FSE 2003, Lund, Sweden, February 24-26, 2003, Revised Papers, pp. 376-395, 2003, Springer, 3-540-20449-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
17 | Marine Minier, Henri Gilbert |
Stochastic Cryptanalysis of Crypton. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, pp. 121-133, 2000, Springer, 3-540-41728-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
17 | Toshinobu Kaneko |
A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings, pp. 485-488, 1991, Springer, 3-540-57332-1. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
17 | Anne Tardy-Corfdir, Henri Gilbert |
A Known Plaintext Attack of FEAL-4 and FEAL-6. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings, pp. 172-181, 1991, Springer, 3-540-55188-3. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
17 | Bert den Boer |
Cryptanalysis of F.E.A.L. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '88, Workshop on the Theory and Application of of Cryptographic Techniques, Davos, Switzerland, May 25-27, 1988, Proceedings, pp. 293-299, 1988, Springer, 3-540-50251-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|