The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for cipher with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1970-1977 (15) 1978-1979 (16) 1980-1981 (17) 1982 (17) 1983-1984 (17) 1985 (15) 1986-1987 (21) 1988 (15) 1989 (15) 1990 (19) 1991 (18) 1992-1993 (33) 1994 (20) 1995-1996 (26) 1997 (28) 1998 (47) 1999 (41) 2000 (67) 2001 (76) 2002 (100) 2003 (124) 2004 (138) 2005 (156) 2006 (196) 2007 (209) 2008 (231) 2009 (214) 2010 (104) 2011 (137) 2012 (119) 2013 (129) 2014 (142) 2015 (139) 2016 (139) 2017 (123) 2018 (161) 2019 (137) 2020 (152) 2021 (158) 2022 (176) 2023 (163) 2024 (39)
Publication types (Num. hits)
article(1672) book(3) incollection(51) inproceedings(2165) phdthesis(18)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2043 occurrences of 632 keywords

Results
Found 3910 publication records. Showing 3909 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
113Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Error correcting cipher, Joint error correction and encryption, Coding and cryptography, Block cipher, Error correcting code
83Liting Zhang, Wenling Wu, Lei Zhang 0012, Yanjun Li A note on Cook's elastic block cipher. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF elastic block cipher, variable-input-length block cipher, encryption, block cipher, security model, pseudorandomness
76Eric Filiol, Caroline Fontaine A New Ultrafast Stream Cipher Design: COS Ciphers. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF vectorized cipher, high speed encryption, Boolean functions, stream cipher, block cipher, nonlinear feedback shift register
73Howard M. Heys Analysis of the Statistical Cipher Feedback Mode of Block Ciphers. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block cipher modes, Cryptography, synchronization, stream ciphers, error propagation
68Yang Xiao 0001, Hsiao-Hwa Chen, Xiaojiang Du, Mohsen Guizani Stream-based cipher feedback mode in wireless error channel. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
66Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, stream cipher, random walks, expander graph
64Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Hong Wang Weaknesses of COSvd (2, 128) Stream Cipher. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF COS cipher, Non- linear feedback shift register, Stream cipher, Divide-and-Conquer
64Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptography, cryptanalysis, Data Encryption Standard (DES), cryptology, multiple encryption, Birthday Paradox
61Wen Ji, Lei Hu New Description of SMS4 by an Embedding overGF(28). Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SMS4, ESMS4, XSL algorithm, block cipher, algebraic equation
59Phillip Rogaway, Mihir Bellare, John Black OCB: A block-cipher mode of operation for efficient authenticated encryption. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block-cipher usage, authenticity, cryptography, integrity, standards, encryption, AES, provable security, modes of operation
58Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert Sosemanuk, a Fast Software-Oriented Stream Cipher. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
58Ed Dawson, Matthew Henricksen, Leonie Simpson The Dragon Stream Cipher: Design, Analysis, and Implementation Issues. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
57Kazuhiko Minematsu Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Cipher Mode, Birthday Bound, Tweakable Block Cipher
56Debra L. Cook, Moti Yung, Angelos D. Keromytis Elastic block ciphers: method, security and instantiations. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Elastic block ciphers, Variable-length block ciphers, Reduction proof, Security analysis, Key recovery attacks
56Debra L. Cook, Moti Yung, Angelos D. Keromytis The Security of Elastic Block Ciphers Against Key-Recovery Attacks. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Variable-length block ciphers, reduction proof, security analysis, key recovery attacks
56Li-Wei Kang, Jin-Jang Leou, Shyi-Shiun Kuo, Wei-Chih Shen An error resilient image camouflaging scheme for secret image transmission. Search on Bibsonomy ISCAS (4) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
56Yuliang Zheng 0001, Tsutomu Matsumoto, Hideki Imai On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
54Chris Hall, David A. Wagner 0001, John Kelsey, Bruce Schneier Building PRFs from PRPs. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cipher feedback mode, block ciphers, pseudo-random functions, pseudo-random permutations, concrete security
54Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin The Random Oracle Model and the Ideal Cipher Model Are Equivalent. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
54Julien Bringer, Hervé Chabanne, Emmanuelle Dottax Perturbing and Protecting a Traceable Block Cipher. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Meiqin Wang, Jorge Nakahara Jr., Yue Sun Cryptanalysis of the Full MMB Block Cipher. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MMB block cipher, square cryptanalysis, differential cryptanalysis, modular multiplication, linear cryptanalysis
52Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater Practical Algebraic Attacks on the Hitag2 Stream Cipher. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hitag 2 algorithm, MiFare Crypto-1 cipher, Gröbner bases, Boolean functions, stream ciphers, RFID tags, SAT solvers, algebraic cryptanalysis
52Shuai Chen, XianXin Zhong, Zhengzhong Wu Chaos block cipher for wireless sensor network. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF discrete chaos, encryption function, single byte, wireless sensor network, block cipher
52Like Chen, Runtong Zhang A Key-dependent Cipher DSDP. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Block cipher algorithm, DSDP structure
52Jorge Nakahara Jr. 3D: A Three-Dimensional Block Cipher. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF block cipher design, 3-dimensional state
52Yaniv Shaked, Avishai Wool Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptanalysis, Stream cipher, Bluetooth, BDD
52John Black The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Information-Theoretic Cryptography, Uninstantiability, Random-Oracle Model, Ideal-Cipher Model
52Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson ManTiCore: Encryption with Joint Cipher-State Authentication. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher
52Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Alpha1, irregular clocking, divide and conquer attack, Cryptanalysis, stream cipher
52Paul Crowley Mercy: A Fast Large Block Cipher for Disk Sector Encryption. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF disk sector, large block, avalanche, Mercy home page: http://www.cluefactory.org.uk/paul/mercy/ http://www.cluefactory.org.uk/paul/mercy/, state machine, Feistel cipher
51Christophe De Cannière Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee 0002, Hyungjin Yang, Jongin Lim 0001 A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF CIKS-1(Cipher with Internal Key Scheduling), Block Cipher, Linear Cryptanalysis, Data-Dependent Permutation
49Gautham Sekar, Bart Preneel Improved Distinguishing Attacks on HC-256. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
49Debra L. Cook, Moti Yung, Angelos D. Keromytis Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security analysis, differential cryptanalysis, linear cryptanalysis
49Xuejia Lai, James L. Massey, Sean Murphy Markov Ciphers and Differential Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
49Cees J. A. Jansen, Tor Helleseth, Alexander Kholosha Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF jump register, stream cipher, Pomaranch
47Côme Berbain, Henri Gilbert On the Security of IV Dependent Stream Ciphers. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IV setup, stream cipher, provable security, PRNG
47Yunyi Liu, Tuanfa Qin, Wansun Ni, Shuyi Zhang Cryptanalysis of the Energy Efficient Stream Ciphers SSC2. Search on Bibsonomy MADNES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF improved Guess-and-Determine attack, fast stream cipher, SSC2, wireless sensor networks, Cryptanalysis
47Debra L. Cook, Angelos D. Keromytis Conversion and Proxy Functions for Symmetric Key Ciphers. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Symmetric Key Cipher Design, Functional Composition, Proxy Cryptography
47Helger Lipmaa Fast Software Implementations of SC2000. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Block cipher design, large S-boxes, SC2000, fast implementation
47Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
47Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann Analysis of the SMS4 Block Cipher. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF UFN, cryptanalysis, block ciphers, algebraic structure
47Raphael C.-W. Phan, Mohammad Umar Siddiqi A Framework for Describing Block Cipher Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF framework, cryptanalysis, generalization, Encryption, block ciphers, distinguishers
47Yevgeniy Dodis, Prashant Puniya On the Relation Between the Ideal Cipher and the Random Oracle Models. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Chin Mun Wee, Peter R. Sutton, Neil W. Bergmann, John A. Williams 0001 Multi Stream Cipher Architecture for Reconfigurable System-on-Chip. Search on Bibsonomy FPL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Maryam Arvandi, Shuwei Wu, Alireza Sadeghian, William W. Melek, Isaac Woungang Symmetric Cipher Design Using Recurrent Neural Networks. Search on Bibsonomy IJCNN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
47Craig Gentry, Zulfikar Ramzan Eliminating Random Permutation Oracles in the Even-Mansour Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47Olivier Billet, Henri Gilbert A Traceable Block Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Matsumoto-Imai, multivariate cryptology, symmetric cryptology, block ciphers, traitor tracing, collusion resistance
47John Black, Phillip Rogaway A Block-Cipher Mode of Operation for Parallelizable Message Authentication. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
47Hongjun Wu Related-Cipher Attacks. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
47Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz OCB: a block-cipher mode of operation for efficient authenticated encryption. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authenticity, cryptography, integrity, standards, encryption, block ciphers, AES, provable security, modes of operation
47Paul Crowley, Stefan Lucks Bias in the LEVIATHAN Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
47Serge Vaudenay On the Security of CS-Cipher. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
47Ueli M. Maurer A Provably-Secure Strongly-Randomized Cipher. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
46Cipher A. Deavours A Ku Klux Klan Cipher. Search on Bibsonomy Cryptologia The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
46Cipher A. Deavours, Brian J. Winkel Cryptanalysis of Shift Stream Generated Stream Cipher Systems - Book Review. Search on Bibsonomy Cryptologia The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
45Ahmed Y. Mahmoud, Alexander G. Chefranov Hill cipher modification based on eigenvalues HCM-EE. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic key, eiqenvalue, hill cipher, exponentiation, matrix, image encryption, pseudorandom number
45Dai Watanabe, Kota Ideguchi, Jun Kitahara, Kenichiro Muto, Hiroki Furuichi, Toshinobu Kaneko Enocoro-80: A Hardware Oriented Stream Cipher. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Panama, stream cipher
45Orr Dunkelman, Nathan Keller A New Attack on the LEX Stream Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF stream cipher design, AES, LEX
45Bin Zhang 0003, Dengguo Feng Security analysis of a new stream cipher. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF divide-and-conquer attack, non-linear feedback shift registers (NLFSR), stream cipher, chaotic sequence
45Bonwook Koo, Hwan Seok Jang, Jung Hwan Song On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher. Search on Bibsonomy ICISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF diffusion layer, SPN, Block cipher, binary matrix
45Sang-Hyun Park, Hoon Choi, Sang-Han Lee, Taejoo Chang The High-Speed Packet Cipher System Suitable for Small Sized Data. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Packet Cipher, SoC(System on Chip), Cryptographic module, Security API
45Palash Sarkar 0001 Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF stream cipher, cellular automata, self-synchronization
45Dong Hyeon Cheon, Sangjin Lee 0002, Jong In Lim 0001, Sung Jae Lee New Block Cipher DONUT Using Pairwise Perfect Decorrelation. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Differential Cryptanalysis (DC), Linear Cryptanalysis (LC), Block cipher, Decorrelation
43Bao Ngoc Tran, Thuc Dinh Nguyen Modular Matrix Cipher and Its Application in Authentication Protocol. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Modular Matrix Algebra, Matrix Cipher, Hill Cipher, Authentication, Hamiltonian Cycle
42Mridul Nandi Fast and Secure CBC-Type MAC Algorithms. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF OMAC, padding rule, prf-security, CBC-MAC
42Haifeng Qian, Zhibin Li 0005, Zhijie Chen, Siman Yang A Practical Optimal Padding for Signature Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Ramesh Karri, Grigori Kuznetsov, Michael Gössel Parity-Based Concurrent Error Detection in Symmetric Block Ciphers. Search on Bibsonomy ITC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
42Mihir Bellare, Phillip Rogaway On the Construction of Variable-Input-Length Ciphers. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Provable Security, Modes of Operation, Symmetric Encryption, Ciphers
42William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cascaded ciphers, Shannon model, Double DES, information theory, DES, Ciphers, meet in the middle attacks
42Martin Boesgaard, Mette Vesterager, Erik Zenner The Rabbit Stream Cipher. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Stream cipher, coupled, non-linear, counter, fast
42Danilo Gligoroski, Smile Markovski, Svein J. Knapskog The Stream Cipher Edon80. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF synchronous stream cipher, quasigroup, quasigroup string transformations, hardware, Latin square
40Antoine Joux, Jean-René Reinhard Overtaking VEST. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF inner collision, chosen IV attack, Stream cipher
40Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum An Analysis of the Hermes8 Stream Ciphers. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hermes8, Cryptanalysis, Stream Cipher
40HyungSo Yoo, ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, IlHwan Park Side Channel Cryptanalysis on SEED. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fault insertion analysis, block cipher, Side channel attack, Differential power analysis, SEED
40Hitoshi Yanami, Takeshi Shimoyama Differential Cryptanalysis of a Reduced-Round SEED. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF symmetric block cipher, probability, differential attack, characteristic, SEED
40Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mahmud, Muhammad Khurram Khan Bio-chaotic Stream Cipher-Based Iris Image Encryption. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
40Jiali Choy, Huihui Yap Impossible Boomerang Attack for Block Cipher Structures. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Impossible Boomerang Attack, Impossible Boomerang Distinguishers, Block Ciphers
40Devesh C. Jinwala, Dhiren R. Patel, Kankar S. Dasgupta Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Authentication, Encryption, Block Ciphers, Link Layer Security
40Christophe De Cannière, Bart Preneel Trivium. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Matthew Robshaw The eSTREAM Project. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Souradyuti Paul, Bart Preneel, Gautham Sekar Distinguishing Attacks on the Stream Cipher Py. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
40Shee-Yau Wu, Shih-Chuan Lu, Chi-Sung Laih Design of AES Based on Dual Cipher and Composite Field. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
40Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee 0002 Impossible Differential Cryptanalysis for Block Cipher Structures. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
40Shai Halevi, Don Coppersmith, Charanjit S. Jutla Scream: A Software-Efficient Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Round functions, Stream ciphers, Block ciphers, SEAL
40Kouichi Sakurai, Yuliang Zheng 0001 Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract). Search on Bibsonomy ISAAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
40Mitsuru Matsui Linear Cryptanalysis Method for DES Cipher. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
38Ewan Fleischmann, Michael Gorski, Stefan Lucks On the Security of Tandem-DM. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher based, double-block length, Tandem-DM, Cryptographic hash function, ideal cipher model, proof of security
38Ewan Fleischmann, Michael Gorski, Stefan Lucks Security of Cyclic Double Block Length Hash Functions. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher based, double-block length, Cyclic-DM, Abreast-DM, cryptographic hash function, ideal cipher model, proof of security
38Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, Mohammad Abdul Matin 0001 Effect of Security Increment to Symmetric Data Encryption through AES Methodology. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF plain text, cipher text, Block cipher, Computer Security, Differential cryptanalysis, Linear cryptanalysis, Symmetric Encryption
38Claude Carlet On the Higher Order Nonlinearities of Algebraic Immune Functions. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF higher order nonlinearity, Boolean function, stream cipher, block cipher, algebraic attack, algebraic immunity, algebraic degree
38Phillip Rogaway, Don Coppersmith A Software-Optimized Encryption Algorithm. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Fast encryption, Pseudorandom functionlinebreak[4] family, Software encryption, Fast encryption, Pseudorandom functionlinebreak[4] family, Software encryption, Cryptography, Cryptography, Stream cipher, Stream cipher, Encryption, Encryption, Key words
38Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman Is the Data Encryption Standard a Group? (Preliminary Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptanalysis, Data Encryption Standard (DES), multiple encryption, Birthday Paradox
38Shrikant Ojha, Naveen Kumar 0001, Kritika Jain, Sangeeta Lal TWIS - A Lightweight Block Cipher. Search on Bibsonomy ICISS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF S-Box, Cipher, lightweight cryptography, CLEFIA
38Lei Zhang 0012, Wentao Zhang, Wenling Wu Cryptanalysis of Reduced-Round SMS4 Block Cipher. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SMS4, Differential characteristic, Block cipher, Differential cryptanalysis, Rectangle attack
38Camel Tanougast, Serge Weber, Gilles Millerioux, Jamal Daafouz, Ahmed Bouridane VLSI Architecture and FPGA Implementation of a Hybrid Message-Embedded Self-Synchronizing Stream Cipher. Search on Bibsonomy DELTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptography system, self-synchronising stream cipher, FPGA, VLSI design
38Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF key-dependent S-box, Mir-1, stream cipher, eSTREAM, key recovery attack
38Shin-Yi Lin, Chih-Tsun Huang A High-Throughput Low-Power AES Cipher for Network Applications. Search on Bibsonomy ASP-DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF 0.13 micron, low-power AES cipher, two-stage pipeline, CCM mode, design-for-test circuitry, 4.27 Gbits/s, 333 MHz, 40.9 mW, CMOS technology, network applications
38Yuan-man Tong, Zhiying Wang 0003, Kui Dai, Hongyi Lu Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF WDDL, power analysis resistant, block cipher, design flow, Wave-pipelining
38Hoon-Jae Lee 0001 Highly Reliable Synchronous Stream Cipher System for Link Encryption. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF synchronization, stream cipher, randomness, Keystream
Displaying result #1 - #100 of 3909 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license