|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2043 occurrences of 632 keywords
|
|
|
Results
Found 3910 publication records. Showing 3909 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
113 | Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi |
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 309-324, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Error correcting cipher, Joint error correction and encryption, Coding and cryptography, Block cipher, Error correcting code |
83 | Liting Zhang, Wenling Wu, Lei Zhang 0012, Yanjun Li |
A note on Cook's elastic block cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 380-383, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
elastic block cipher, variable-input-length block cipher, encryption, block cipher, security model, pseudorandomness |
76 | Eric Filiol, Caroline Fontaine |
A New Ultrafast Stream Cipher Design: COS Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 8th IMA International Conference, Cirencester, UK, December 17-19, 2001, Proceedings, pp. 85-98, 2001, Springer, 3-540-43026-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
vectorized cipher, high speed encryption, Boolean functions, stream cipher, block cipher, nonlinear feedback shift register |
73 | Howard M. Heys |
Analysis of the Statistical Cipher Feedback Mode of Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 52(1), pp. 77-92, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
block cipher modes, Cryptography, synchronization, stream ciphers, error propagation |
68 | Yang Xiao 0001, Hsiao-Hwa Chen, Xiaojiang Du, Mohsen Guizani |
Stream-based cipher feedback mode in wireless error channel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Wirel. Commun. ![In: IEEE Trans. Wirel. Commun. 8(2), pp. 622-626, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
66 | Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan |
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 1-19, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, stream cipher, random walks, expander graph |
64 | Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Hong Wang |
Weaknesses of COSvd (2, 128) Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers, pp. 270-283, 2005, Springer, 3-540-33354-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
COS cipher, Non- linear feedback shift register, Stream cipher, Divide-and-Conquer |
64 | Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman |
Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings, pp. 212-226, 1985, Springer, 3-540-16463-4. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptography, cryptanalysis, Data Encryption Standard (DES), cryptology, multiple encryption, Birthday Paradox |
61 | Wen Ji, Lei Hu |
New Description of SMS4 by an Embedding overGF(28). ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 238-251, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
SMS4, ESMS4, XSL algorithm, block cipher, algebraic equation |
59 | Phillip Rogaway, Mihir Bellare, John Black |
OCB: A block-cipher mode of operation for efficient authenticated encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(3), pp. 365-403, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
block-cipher usage, authenticity, cryptography, integrity, standards, encryption, AES, provable security, modes of operation |
58 | Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert |
Sosemanuk, a Fast Software-Oriented Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The eSTREAM Finalists ![In: New Stream Cipher Designs - The eSTREAM Finalists, pp. 98-118, 2008, Springer, 978-3-540-68350-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
58 | Ed Dawson, Matthew Henricksen, Leonie Simpson |
The Dragon Stream Cipher: Design, Analysis, and Implementation Issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The eSTREAM Finalists ![In: New Stream Cipher Designs - The eSTREAM Finalists, pp. 20-38, 2008, Springer, 978-3-540-68350-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Kazuhiko Minematsu |
Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 308-326, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Block Cipher Mode, Birthday Bound, Tweakable Block Cipher |
56 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
Elastic block ciphers: method, security and instantiations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(3), pp. 211-231, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Elastic block ciphers, Variable-length block ciphers, Reduction proof, Security analysis, Key recovery attacks |
56 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
The Security of Elastic Block Ciphers Against Key-Recovery Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 89-103, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Variable-length block ciphers, reduction proof, security analysis, key recovery attacks |
56 | Li-Wei Kang, Jin-Jang Leou, Shyi-Shiun Kuo, Wei-Chih Shen |
An error resilient image camouflaging scheme for secret image transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS (4) ![In: International Symposium on Circuits and Systems (ISCAS 2005), 23-26 May 2005, Kobe, Japan, pp. 3998-4001, 2005, IEEE, 0-7803-8834-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
56 | Yuliang Zheng 0001, Tsutomu Matsumoto, Hideki Imai |
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 461-480, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
54 | Chris Hall, David A. Wagner 0001, John Kelsey, Bruce Schneier |
Building PRFs from PRPs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 370-389, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
cipher feedback mode, block ciphers, pseudo-random functions, pseudo-random permutations, concrete security |
54 | Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin |
The Random Oracle Model and the Ideal Cipher Model Are Equivalent. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 1-20, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Julien Bringer, Hervé Chabanne, Emmanuelle Dottax |
Perturbing and Protecting a Traceable Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Multimedia Security ![In: Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, pp. 109-119, 2006, Springer, 3-540-47820-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Meiqin Wang, Jorge Nakahara Jr., Yue Sun |
Cryptanalysis of the Full MMB Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 231-248, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
MMB block cipher, square cryptanalysis, differential cryptanalysis, modular multiplication, linear cryptanalysis |
52 | Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater |
Practical Algebraic Attacks on the Hitag2 Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 167-176, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Hitag 2 algorithm, MiFare Crypto-1 cipher, Gröbner bases, Boolean functions, stream ciphers, RFID tags, SAT solvers, algebraic cryptanalysis |
52 | Shuai Chen, XianXin Zhong, Zhengzhong Wu |
Chaos block cipher for wireless sensor network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(8), pp. 1055-1063, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
discrete chaos, encryption function, single byte, wireless sensor network, block cipher |
52 | Like Chen, Runtong Zhang |
A Key-dependent Cipher DSDP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 310-313, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Block cipher algorithm, DSDP structure |
52 | Jorge Nakahara Jr. |
3D: A Three-Dimensional Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings, pp. 252-267, 2008, Springer, 978-3-540-89640-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
block cipher design, 3-dimensional state |
52 | Yaniv Shaked, Avishai Wool |
Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 187-202, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Stream cipher, Bluetooth, BDD |
52 | John Black |
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers, pp. 328-340, 2006, Springer, 3-540-36597-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Information-Theoretic Cryptography, Uninstantiability, Random-Oracle Model, Ideal-Cipher Model |
52 | Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson |
ManTiCore: Encryption with Joint Cipher-State Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 440-453, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher |
52 | Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson |
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 418-431, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Alpha1, irregular clocking, divide and conquer attack, Cryptanalysis, stream cipher |
52 | Paul Crowley |
Mercy: A Fast Large Block Cipher for Disk Sector Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 7th International Workshop, FSE 2000, New York, NY, USA, April 10-12, 2000, Proceedings, pp. 49-63, 2000, Springer, 3-540-41728-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
disk sector, large block, avalanche, Mercy home page: http://www.cluefactory.org.uk/paul/mercy/ http://www.cluefactory.org.uk/paul/mercy/, state machine, Feistel cipher |
51 | Christophe De Cannière |
Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 171-186, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee 0002, Hyungjin Yang, Jongin Lim 0001 |
A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 456-468, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
CIKS-1(Cipher with Internal Key Scheduling), Block Cipher, Linear Cryptanalysis, Data-Dependent Permutation |
49 | Gautham Sekar, Bart Preneel |
Improved Distinguishing Attacks on HC-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings, pp. 38-52, 2009, Springer, 978-3-642-04845-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
49 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 187-202, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security analysis, differential cryptanalysis, linear cryptanalysis |
49 | Xuejia Lai, James L. Massey, Sean Murphy |
Markov Ciphers and Differential Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '91, Workshop on the Theory and Application of of Cryptographic Techniques, Brighton, UK, April 8-11, 1991, Proceedings, pp. 17-38, 1991, Springer, 3-540-54620-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
49 | Cees J. A. Jansen, Tor Helleseth, Alexander Kholosha |
Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The eSTREAM Finalists ![In: New Stream Cipher Designs - The eSTREAM Finalists, pp. 224-243, 2008, Springer, 978-3-540-68350-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
jump register, stream cipher, Pomaranch |
47 | Côme Berbain, Henri Gilbert |
On the Security of IV Dependent Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers, pp. 254-273, 2007, Springer, 978-3-540-74617-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
IV setup, stream cipher, provable security, PRNG |
47 | Yunyi Liu, Tuanfa Qin, Wansun Ni, Shuyi Zhang |
Cryptanalysis of the Energy Efficient Stream Ciphers SSC2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MADNES ![In: Secure Mobile Ad-hoc Networks and Sensors, First International Workshop, MADNES 2005, Singapore, September 20-22, 2005, Revised Selected Papers, pp. 144-157, 2005, Springer, 3-540-36646-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
improved Guess-and-Determine attack, fast stream cipher, SSC2, wireless sensor networks, Cryptanalysis |
47 | Debra L. Cook, Angelos D. Keromytis |
Conversion and Proxy Functions for Symmetric Key Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 662-667, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Symmetric Key Cipher Design, Functional Composition, Proxy Cryptography |
47 | Helger Lipmaa |
Fast Software Implementations of SC2000. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings, pp. 63-74, 2002, Springer, 3-540-44270-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Block cipher design, large S-boxes, SC2000, fast implementation |
47 | Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki |
A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 53(9), pp. 3250-3255, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann |
Analysis of the SMS4 Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 158-170, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
UFN, cryptanalysis, block ciphers, algebraic structure |
47 | Raphael C.-W. Phan, Mohammad Umar Siddiqi |
A Framework for Describing Block Cipher Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 55(11), pp. 1402-1409, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
framework, cryptanalysis, generalization, Encryption, block ciphers, distinguishers |
47 | Yevgeniy Dodis, Prashant Puniya |
On the Relation Between the Ideal Cipher and the Random Oracle Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, pp. 184-206, 2006, Springer, 3-540-32731-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Chin Mun Wee, Peter R. Sutton, Neil W. Bergmann, John A. Williams 0001 |
Multi Stream Cipher Architecture for Reconfigurable System-on-Chip. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FPL ![In: Proceedings of the 2006 International Conference on Field Programmable Logic and Applications (FPL), Madrid, Spain, August 28-30, 2006, pp. 1-4, 2006, IEEE, 1-4244-0312-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Maryam Arvandi, Shuwei Wu, Alireza Sadeghian, William W. Melek, Isaac Woungang |
Symmetric Cipher Design Using Recurrent Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2006, part of the IEEE World Congress on Computational Intelligence, WCCI 2006, Vancouver, BC, Canada, 16-21 July 2006, pp. 2039-2046, 2006, IEEE, 0-7803-9490-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Craig Gentry, Zulfikar Ramzan |
Eliminating Random Permutation Oracles in the Even-Mansour Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings, pp. 32-47, 2004, Springer, 3-540-23975-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Olivier Billet, Henri Gilbert |
A Traceable Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings, pp. 331-346, 2003, Springer, 3-540-20592-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai, multivariate cryptology, symmetric cryptology, block ciphers, traitor tracing, collusion resistance |
47 | John Black, Phillip Rogaway |
A Block-Cipher Mode of Operation for Parallelizable Message Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 384-397, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
47 | Hongjun Wu |
Related-Cipher Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 447-455, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
47 | Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz |
OCB: a block-cipher mode of operation for efficient authenticated encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 196-205, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
authenticity, cryptography, integrity, standards, encryption, block ciphers, AES, provable security, modes of operation |
47 | Paul Crowley, Stefan Lucks |
Bias in the LEVIATHAN Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 8th International Workshop, FSE 2001 Yokohama, Japan, April 2-4, 2001, Revised Papers, pp. 211-218, 2001, Springer, 3-540-43869-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
47 | Serge Vaudenay |
On the Security of CS-Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings, pp. 260-274, 1999, Springer, 3-540-66226-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
47 | Ueli M. Maurer |
A Provably-Secure Strongly-Randomized Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '90, Workshop on the Theory and Application of of Cryptographic Techniques, Aarhus, Denmark, May 21-24, 1990, Proceedings, pp. 361-373, 1990, Springer, 3-540-53587-X. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
46 | Cipher A. Deavours |
A Ku Klux Klan Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptologia ![In: Cryptologia 13(3), pp. 210-214, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
46 | Cipher A. Deavours, Brian J. Winkel |
Cryptanalysis of Shift Stream Generated Stream Cipher Systems - Book Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptologia ![In: Cryptologia 8(4), pp. 360-363, 1984. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
45 | Ahmed Y. Mahmoud, Alexander G. Chefranov |
Hill cipher modification based on eigenvalues HCM-EE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 164-167, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
dynamic key, eiqenvalue, hill cipher, exponentiation, matrix, image encryption, pseudorandom number |
45 | Dai Watanabe, Kota Ideguchi, Jun Kitahara, Kenichiro Muto, Hiroki Furuichi, Toshinobu Kaneko |
Enocoro-80: A Hardware Oriented Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1294-1300, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Panama, stream cipher |
45 | Orr Dunkelman, Nathan Keller |
A New Attack on the LEX Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 539-556, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
stream cipher design, AES, LEX |
45 | Bin Zhang 0003, Dengguo Feng |
Security analysis of a new stream cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 49(3), pp. 286-301, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
divide-and-conquer attack, non-linear feedback shift registers (NLFSR), stream cipher, chaotic sequence |
45 | Bonwook Koo, Hwan Seok Jang, Jung Hwan Song |
On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings, pp. 51-64, 2006, Springer, 3-540-49112-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
diffusion layer, SPN, Block cipher, binary matrix |
45 | Sang-Hyun Park, Hoon Choi, Sang-Han Lee, Taejoo Chang |
The High-Speed Packet Cipher System Suitable for Small Sized Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 364-377, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Packet Cipher, SoC(System on Chip), Cryptographic module, Security API |
45 | Palash Sarkar 0001 |
Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 36-51, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
stream cipher, cellular automata, self-synchronization |
45 | Dong Hyeon Cheon, Sangjin Lee 0002, Jong In Lim 0001, Sung Jae Lee |
New Block Cipher DONUT Using Pairwise Perfect Decorrelation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2000, First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000, Proceedings, pp. 262-270, 2000, Springer, 3-540-41452-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Differential Cryptanalysis (DC), Linear Cryptanalysis (LC), Block cipher, Decorrelation |
43 | Bao Ngoc Tran, Thuc Dinh Nguyen |
Modular Matrix Cipher and Its Application in Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 318-323, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Modular Matrix Algebra, Matrix Cipher, Hill Cipher, Authentication, Hamiltonian Cycle |
42 | Mridul Nandi |
Fast and Secure CBC-Type MAC Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 375-393, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
OMAC, padding rule, prf-security, CBC-MAC |
42 | Haifeng Qian, Zhibin Li 0005, Zhijie Chen, Siman Yang |
A Practical Optimal Padding for Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 112-128, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Ramesh Karri, Grigori Kuznetsov, Michael Gössel |
Parity-Based Concurrent Error Detection in Symmetric Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITC ![In: Proceedings 2003 International Test Conference (ITC 2003), Breaking Test Interface Bottlenecks, 28 September - 3 October 2003, Charlotte, NC, USA, pp. 919-926, 2003, IEEE Computer Society, 0-7803-8106-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Mihir Bellare, Phillip Rogaway |
On the Construction of Variable-Input-Length Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 6th International Workshop, FSE '99, Rome, Italy, March 24-26, 1999, Proceedings, pp. 231-244, 1999, Springer, 3-540-66226-X. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Provable Security, Modes of Operation, Symmetric Encryption, Ciphers |
42 | William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan |
Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 390-407, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
cascaded ciphers, Shannon model, Double DES, information theory, DES, Ciphers, meet in the middle attacks |
42 | Martin Boesgaard, Mette Vesterager, Erik Zenner |
The Rabbit Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The eSTREAM Finalists ![In: New Stream Cipher Designs - The eSTREAM Finalists, pp. 69-83, 2008, Springer, 978-3-540-68350-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Stream cipher, coupled, non-linear, counter, fast |
42 | Danilo Gligoroski, Smile Markovski, Svein J. Knapskog |
The Stream Cipher Edon80. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The eSTREAM Finalists ![In: New Stream Cipher Designs - The eSTREAM Finalists, pp. 152-169, 2008, Springer, 978-3-540-68350-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
synchronous stream cipher, quasigroup, quasigroup string transformations, hardware, Latin square |
40 | Antoine Joux, Jean-René Reinhard |
Overtaking VEST. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers, pp. 58-72, 2007, Springer, 978-3-540-74617-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
inner collision, chosen IV attack, Stream cipher |
40 | Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum |
An Analysis of the Hermes8 Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 1-10, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Hermes8, Cryptanalysis, Stream Cipher |
40 | HyungSo Yoo, ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, IlHwan Park |
Side Channel Cryptanalysis on SEED. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers, pp. 411-424, 2004, Springer, 3-540-24015-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Fault insertion analysis, block cipher, Side channel attack, Differential power analysis, SEED |
40 | Hitoshi Yanami, Takeshi Shimoyama |
Differential Cryptanalysis of a Reduced-Round SEED. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security in Communication Networks, Third International Conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers, pp. 186-198, 2002, Springer, 3-540-00420-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
symmetric block cipher, probability, differential attack, characteristic, SEED |
40 | Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mahmud, Muhammad Khurram Khan |
Bio-chaotic Stream Cipher-Based Iris Image Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 739-744, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Jiali Choy, Huihui Yap |
Impossible Boomerang Attack for Block Cipher Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings, pp. 22-37, 2009, Springer, 978-3-642-04845-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Impossible Boomerang Attack, Impossible Boomerang Distinguishers, Block Ciphers |
40 | Devesh C. Jinwala, Dhiren R. Patel, Kankar S. Dasgupta |
Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 258-272, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Authentication, Encryption, Block Ciphers, Link Layer Security |
40 | Christophe De Cannière, Bart Preneel |
Trivium. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The eSTREAM Finalists ![In: New Stream Cipher Designs - The eSTREAM Finalists, pp. 244-266, 2008, Springer, 978-3-540-68350-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Matthew Robshaw |
The eSTREAM Project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
The eSTREAM Finalists ![In: New Stream Cipher Designs - The eSTREAM Finalists, pp. 1-6, 2008, Springer, 978-3-540-68350-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Souradyuti Paul, Bart Preneel, Gautham Sekar |
Distinguishing Attacks on the Stream Cipher Py. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 13th International Workshop, FSE 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers, pp. 405-421, 2006, Springer, 3-540-36597-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Shee-Yau Wu, Shih-Chuan Lu, Chi-Sung Laih |
Design of AES Based on Dual Cipher and Composite Field. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 25-38, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee 0002 |
Impossible Differential Cryptanalysis for Block Cipher Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 82-96, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Shai Halevi, Don Coppersmith, Charanjit S. Jutla |
Scream: A Software-Efficient Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 9th International Workshop, FSE 2002, Leuven, Belgium, February 4-6, 2002, Revised Papers, pp. 195-209, 2002, Springer, 3-540-44009-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Round functions, Stream ciphers, Block ciphers, SEAL |
40 | Kouichi Sakurai, Yuliang Zheng 0001 |
Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 7th International Symposium, ISAAC '96, Osaka, Japan, December 16-18, 1996, Proceedings, pp. 376-385, 1996, Springer, 3-540-62048-6. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
40 | Mitsuru Matsui |
Linear Cryptanalysis Method for DES Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '93, Workshop on the Theory and Application of of Cryptographic Techniques, Lofthus, Norway, May 23-27, 1993, Proceedings, pp. 386-397, 1993, Springer, 3-540-57600-2. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
38 | Ewan Fleischmann, Michael Gorski, Stefan Lucks |
On the Security of Tandem-DM. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers, pp. 84-103, 2009, Springer, 978-3-642-03316-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
block cipher based, double-block length, Tandem-DM, Cryptographic hash function, ideal cipher model, proof of security |
38 | Ewan Fleischmann, Michael Gorski, Stefan Lucks |
Security of Cyclic Double Block Length Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 12th IMA International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings, pp. 153-175, 2009, Springer, 978-3-642-10867-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
block cipher based, double-block length, Cyclic-DM, Abreast-DM, cryptographic hash function, ideal cipher model, proof of security |
38 | Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, Mohammad Abdul Matin 0001 |
Effect of Security Increment to Symmetric Data Encryption through AES Methodology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 291-294, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
plain text, cipher text, Block cipher, Computer Security, Differential cryptanalysis, Linear cryptanalysis, Symmetric Encryption |
38 | Claude Carlet |
On the Higher Order Nonlinearities of Algebraic Immune Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings, pp. 584-601, 2006, Springer, 3-540-37432-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
higher order nonlinearity, Boolean function, stream cipher, block cipher, algebraic attack, algebraic immunity, algebraic degree |
38 | Phillip Rogaway, Don Coppersmith |
A Software-Optimized Encryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(4), pp. 273-287, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Fast encryption, Pseudorandom functionlinebreak[4] family, Software encryption, Fast encryption, Pseudorandom functionlinebreak[4] family, Software encryption, Cryptography, Cryptography, Stream cipher, Stream cipher, Encryption, Encryption, Key words |
38 | Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman |
Is the Data Encryption Standard a Group? (Preliminary Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '85, Workshop on the Theory and Application of of Cryptographic Techniques, Linz, Austria, April 1985, Proceedings, pp. 81-95, 1985, Springer, 3-540-16468-5. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptanalysis, Data Encryption Standard (DES), multiple encryption, Birthday Paradox |
38 | Shrikant Ojha, Naveen Kumar 0001, Kritika Jain, Sangeeta Lal |
TWIS - A Lightweight Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 5th International Conference, ICISS 2009, Kolkata, India, December 14-18, 2009, Proceedings, pp. 280-291, 2009, Springer, 978-3-642-10771-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
S-Box, Cipher, lightweight cryptography, CLEFIA |
38 | Lei Zhang 0012, Wentao Zhang, Wenling Wu |
Cryptanalysis of Reduced-Round SMS4 Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008, Proceedings, pp. 216-229, 2008, Springer, 978-3-540-69971-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
SMS4, Differential characteristic, Block cipher, Differential cryptanalysis, Rectangle attack |
38 | Camel Tanougast, Serge Weber, Gilles Millerioux, Jamal Daafouz, Ahmed Bouridane |
VLSI Architecture and FPGA Implementation of a Hybrid Message-Embedded Self-Synchronizing Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DELTA ![In: 4th IEEE International Symposium on Electronic Design, Test and Applications, DELTA 2008, Hong Kong, January 23-25, 2008, pp. 386-389, 2008, IEEE Computer Society, 978-0-7695-3110-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Cryptography system, self-synchronising stream cipher, FPGA, VLSI design |
38 | Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki |
Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 128-140, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
key-dependent S-box, Mir-1, stream cipher, eSTREAM, key recovery attack |
38 | Shin-Yi Lin, Chih-Tsun Huang |
A High-Throughput Low-Power AES Cipher for Network Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of the 12th Conference on Asia South Pacific Design Automation, ASP-DAC 2007, Yokohama, Japan, January 23-26, 2007, pp. 595-600, 2007, IEEE Computer Society, 1-4244-0629-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
0.13 micron, low-power AES cipher, two-stage pipeline, CCM mode, design-for-test circuitry, 4.27 Gbits/s, 333 MHz, 40.9 mW, CMOS technology, network applications |
38 | Yuan-man Tong, Zhiying Wang 0003, Kui Dai, Hongyi Lu |
Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 66-77, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
WDDL, power analysis resistant, block cipher, design flow, Wave-pipelining |
38 | Hoon-Jae Lee 0001 |
Highly Reliable Synchronous Stream Cipher System for Link Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 269-278, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
synchronization, stream cipher, randomness, Keystream |
Displaying result #1 - #100 of 3909 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|