Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
186 | Erik Zenner |
Nonce Generators and the Nonce Reset Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 411-426, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Nonce Reset, Nonce Generator, Cryptography, Security Engineering, Nonce |
97 | Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 |
Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 307-311, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i |
97 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 280-286, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
nonce-based encryption, security model, modes of operation, Blockcipher, tweakable blockcipher |
80 | Eun-Jun Yoon, Kee-Young Yoo |
Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (3) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Contemporary Intelligent Computing Techniques, 4th International Conference on Intelligent Computing, ICIC 2008, Shanghai, China, September 15-18, 2008, Proceedings, pp. 533-540, 2008, Springer, 978-3-540-85929-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Protocol, Cryptanalysis, Key agreement, Chaotic maps, Nonce |
71 | Fangyong Hou, Dawu Gu, Nong Xiao, Zhiping Cai |
Efficient disk encryption and verification through trusted nonce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), July 6-9, Marrakech, Morocco, pp. 304-309, 2008, IEEE Computer Society, 978-1-4244-2702-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
71 | Phillip Rogaway |
Nonce-Based Symmetric Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers, pp. 348-359, 2004, Springer, 3-540-22171-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Initialization vector, provable security, modes of operation, symmetric encryption, nonces |
55 | Chang-Hyun Kim, Myungwhan Choi |
TCP Recovering Multiple Packet Losses over Wireless Links Using Nonce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Networking Technologies for Enhanced Internet Services International Conference, ICOIN 2003, Cheju Island, Korea, February 12-14, 2003, Revised Selected Papers, pp. 604-613, 2003, Springer, 3-540-40827-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
49 | Kouichi Sakurai, Tsuyoshi Takagi |
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, Proceedings, pp. 1-16, 2002, Springer, 3-540-43168-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
44 | Jean Paul Degabriele, Vukasin Karadzic |
Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 817, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
44 | Jean Paul Degabriele, Vukasin Karadzic |
Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (4) ![In: Advances in Cryptology - CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15-18, 2022, Proceedings, Part IV, pp. 264-295, 2022, Springer, 978-3-031-15984-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
44 | Geng Wang, Haiyang Zhang, Fengmei Liu |
Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 831, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
42 | Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won |
Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 158-176, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
nonce-chained authentication, scalability, Cryptography, provable security, binary tree, group key exchange |
42 | Debasis Giri, Parmeshwary Dayal Srivastava |
Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Third International Conference, ICISS 2007, Delhi, India, December 16-20, 2007, Proceedings, pp. 156-166, 2007, Springer, 978-3-540-77085-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Authentication, Smart card, Attack, Timestamp, Nonce |
38 | Wenbo Shi, Hyeong Seon Yoo |
Efficient Nonce-Based Authentication Scheme Using Token-Update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 213-221, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
38 | J. Philip Benkard |
Nonce Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APL ![In: Conference Proceedings on APL 90: For the Future, APL 1990, Copenhagen, Denmark, August 13-17, 1990., pp. 27-39, 1990, ACM, 0-89791-371-X. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
APL |
33 | Fangyong Hou, Dawu Gu, Nong Xiao, Fang Liu 0002, Hongjun He |
Performance and Consistency Improvements of Hash Tree Based Disk Storage Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NAS ![In: International Conference on Networking, Architecture, and Storage, NAS 2009, 9-11 July 2009, Zhang Jia Jie, Hunan, China, pp. 51-56, 2009, IEEE Computer Society, 978-0-7695-3741-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
33 | Ayesha Altaf, M. Younus Javed, Attiq Ahmed |
Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2008, In conjunction with Second International Workshop on Advanced Internet Technology and Applications, August 6-8, 2008, Phuket, Thailand, pp. 335-339, 2008, IEEE Computer Society, 978-0-7695-3263-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Privcy and Key Management, security |
33 | David A. McGrew, Scott R. Fluhrer |
The Security of the Extended Codebook (XCB) Mode of Operation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers, pp. 311-327, 2007, Springer, 978-3-540-77359-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
33 | Dayin Wang, Dongdai Lin, Wenling Wu |
OPMAC: One-Key Poly1305 MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 78-87, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Carter-Wegman MAC, Universal Hash Family, Block cipher, Message Authentication Code, Pseudorandom Function, Pseudorandom Permutation |
33 | Dayin Wang, Dongdai Lin, Wenling Wu |
An Improved Poly1305 MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 284-292, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
33 | Phillip Rogaway |
Authenticated-encryption with associated-data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 98-107, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
OCB, associated-data problem, block-cipher usage, key separation, modes of operation, authenticated-encryption |
26 | Rosario Gennaro |
Randomness in Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(2), pp. 64-67, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cryptography, predictable, randomness, nonce |
22 | Yiming Gao, Jinghui Wang, Honggang Hu, Binang He |
Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2024, pp. 296, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
22 | Shuai Liu, Jizhou Ren, Jie Guan, Bin Hu 0011, Sudong Ma, Hao Bai |
A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. J. ![In: Comput. J. 67(4), pp. 1370-1380, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
22 | Akiko Inoue, Chun Guo 0002, Kazuhiko Minematsu |
Nonce-misuse resilience of Romulus-N and GIFT-COFB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IET Inf. Secur. ![In: IET Inf. Secur. 17(3), pp. 468-484, May 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sönmez Turan |
Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 4501-4516, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | David Arps, Laura Kallmeyer, Younes Samih, Hassan Sajjad 0001 |
Multilingual Nonce Dependency Treebanks: Understanding how LLMs represent and process syntactic structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.07497, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Matteo Golinelli, Francesco Bonomi, Bruno Crispo |
The Nonce-nce of Web Security: an Investigation of CSP Nonces Reuse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2309.07782, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Richard Ostertág |
On the usefulness of linear types for correct nonce use enforcement during compile time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.04138, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Luyao Xu, Zhengyi Dai, Baofeng Wu, Dongdai Lin |
Improved Attacks on (EC)DSA with Nonce Leakage by Lattice Sieving with Predicate. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2), pp. 568-586, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Marco Macchetti |
A Novel Related Nonce Attack for ECDSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 305, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
22 | Yao Sun, Shuai Chang |
A New Sieving Approach for Solving the HNP with One Bit of Nonce by Using Built-in Modulo Arithmetic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1137, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
22 | Shunsuke Osaki, Noboru Kunihiro |
Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC (1) ![In: Information Security and Cryptology - ICISC 2023 - 26th International Conference on Information Security and Cryptology, ICISC 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part I, pp. 163-184, 2023, Springer, 978-981-97-1234-2. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Matteo Golinelli, Francesco Bonomi, Bruno Crispo |
The Nonce-nce of Web Security: An Investigation of CSP Nonces Reuse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS Workshops (2) ![In: Computer Security. ESORICS 2023 International Workshops - CPS4CIP, ADIoT, SecAssure, WASP, TAURIN, PriST-AI, and SECAI, The Hague, The Netherlands, September 25-29, 2023, Revised Selected Papers, Part II, pp. 459-475, 2023, Springer, 978-3-031-54128-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
22 | Chao Sun, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe |
Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Cryptogr. Hardw. Embed. Syst. ![In: IACR Trans. Cryptogr. Hardw. Embed. Syst. 2022(1), pp. 391-413, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Seth Hoffert |
Nonce-encrypting AEAD Modes with Farfalle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1711, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
22 | Donghoon Chang, Deukjo Hong, Jinkeon Kang |
Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 544, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
22 | Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sönmez Turan |
Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1456, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
22 | Akiko Inoue, Chun Guo 0002, Kazuhiko Minematsu |
Nonce-Misuse Resilience of Romulus-N and GIFT-COFB. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2022, pp. 1012, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
22 | Jules Baudrin, Anne Canteaut, Léo Perrin |
Practical Cube Attack against Nonce-Misused Ascon. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2022(4), pp. 120-144, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Sho Sugauchi, Satoshi Obana |
Fully Subliminal-Free Schnorr Signature for Nonce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANDAR ![In: Tenth International Symposium on Computing and Networking, CANDAR 2022, Himeji, Japan, November 21-24, 2022, pp. 179-185, 2022, IEEE, 978-1-6654-7530-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Shay Gueron |
Counter Mode for Long Messages and a Long Nonce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCML ![In: Cyber Security, Cryptology, and Machine Learning - 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings, pp. 224-231, 2022, Springer, 978-3-031-07688-6. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
22 | Yu Long Chen, Bart Mennink, Bart Preneel |
Categorization of Faulty Nonce Misuse Resistant Message Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2021, pp. 1696, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
22 | Khodakhast Bibak, Robert Ritchie 0001 |
Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Quantum Inf. Process. ![In: Quantum Inf. Process. 20(7), pp. 1-18, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Yu Long Chen, Bart Mennink, Bart Preneel |
Categorization of Faulty Nonce Misuse Resistant Message Authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (3) ![In: Advances in Cryptology - ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part III, pp. 520-550, 2021, Springer, 978-3-030-92077-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | Monjur Alam, Baki Berkay Yilmaz, Frank Werner 0005, Niels Samwel, Alenka G. Zajic, Daniel Genkin, Yuval Yarom, Milos Prvulovic |
Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P ![In: IEEE European Symposium on Security and Privacy, EuroS&P 2021, Vienna, Austria, September 6-10, 2021, pp. 507-522, 2021, IEEE, 978-1-6654-1491-3. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
22 | B. Arunkumar 0001, G. Kousalya 0001 |
Nonce reuse/misuse resistance authentication encryption schemes for modern TLS cipher suites and QUIC based web servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Fuzzy Syst. ![In: J. Intell. Fuzzy Syst. 38(5), pp. 6483-6493, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Laura M. Roberts, David Plonka |
Watching the Watchers: Nonce-based Inverse Surveillance to Remotely Detect Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2005.07641, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Na-Young Ahn, Dong Hoon Lee 0001 |
Secure Vehicle Communications Using Proof-of-Nonce Blockchain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2011.07846, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Dat Phuc Tran Song, Byoungjin Seok, Changhoon Lee |
HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Soft Comput. ![In: Appl. Soft Comput. 97(Part), pp. 106663, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Mohit Sahni |
Online Certificate Status Protocol (OCSP) Nonce Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8954, pp. 1-6, November 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi 0002, Mehdi Tibouchi, Yuval Yarom |
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 615, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Elena Andreeva 0001, Amit Singh Bhati, Damian Vizár |
Nonce-Misuse Security of the SAEF Authenticated Encryption mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 1524, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Wonseok Choi 0002, ByeongHak Lee, Yeongmin Lee, Jooyoung Lee 0001 |
Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 1145, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Avijit Dutta, Mridul Nandi |
BBB Secure Nonce Based MAC Using Public Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 509, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Wonseok Choi 0002, Akiko Inoue, ByeongHak Lee, Jooyoung Lee 0001, Eik List, Kazuhiko Minematsu, Yusuke Naito 0001 |
Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Trans. Symmetric Cryptol. ![In: IACR Trans. Symmetric Cryptol. 2020(4), pp. 39-70, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi 0002, Mehdi Tibouchi, Yuval Yarom |
LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, USA, November 9-13, 2020, pp. 225-242, 2020, ACM, 978-1-4503-7089-9. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Elena Andreeva 0001, Amit Singh Bhati, Damian Vizár |
Nonce-Misuse Security of the SAEF Authenticated Encryption Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Selected Areas in Cryptography - SAC 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers, pp. 512-534, 2020, Springer, 978-3-030-81651-3. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Samuel Weiser, David Schrammel, Lukas Bodner, Raphael Spreitzer |
Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 29th USENIX Security Symposium, USENIX Security 2020, August 12-14, 2020, pp. 1767-1784, 2020, USENIX Association, 978-1-939133-17-5. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Wonseok Choi 0002, ByeongHak Lee, Yeongmin Lee, Jooyoung Lee 0001 |
Improved Security Analysis for Nonce-Based Enhanced Hash-then-Mask MACs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT (1) ![In: Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I, pp. 697-723, 2020, Springer, 978-3-030-64836-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Laura M. Roberts, David Plonka |
Watching the Watchers: Nonce-based Inverse Surveillance to Remotely Detect Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TMA ![In: 4th Network Traffic Measurement and Analysis Conference, TMA 2020, Berlin, Germany, June 10, 2020., 2020, IFIP, 978-3-903176-27-0. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
22 | Avijit Dutta, Mridul Nandi |
BBB Secure Nonce Based MAC Using Public Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings, pp. 172-191, 2020, Springer, 978-3-030-51937-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
22 | Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda |
sfDWCDM+: A BBB secure nonce based MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Adv. Math. Commun. ![In: Adv. Math. Commun. 13(4), pp. 705-732, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi |
Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant Authenticated Encryption Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Very Large Scale Integr. Syst. ![In: IEEE Trans. Very Large Scale Integr. Syst. 27(5), pp. 1053-1066, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Tairong Shi, Jie Guan |
Real-time state recovery attack against MORUS in nonce-misuse setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Inf. Sci. ![In: Sci. China Inf. Sci. 62(3), pp. 39109:1-39109:3, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Burong Kang, Xinyu Meng, Lei Zhang 0009, Yinxia Sun |
Nonce-Based Key Agreement Protocol Against Bad Randomness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Found. Comput. Sci. ![In: Int. J. Found. Comput. Sci. 30(4), pp. 619-633, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Shay Gueron, Adam Langley, Yehuda Lindell |
AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RFC ![In: RFC 8452, pp. 1-42, April 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Avijit Dutta, Mridul Nandi, Suprita Talnikar |
Beyond Birthday Bound Secure MAC in Faulty Nonce Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 127, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
22 | Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay |
On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 585, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
22 | Patrick Kresmer, Alexander Zeh |
CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 892, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
22 | Mustafa Khairallah |
Forgery Attack on mixFeed in the Nonce-Misuse Scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 457, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
22 | Joachim Breitner, Nadia Heninger |
Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2019, pp. 23, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
22 | Joachim Breitner, Nadia Heninger |
Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security - 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019, Revised Selected Papers, pp. 3-20, 2019, Springer, 978-3-030-32100-0. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Chun Guo 0002, Olivier Pereira, Thomas Peters, François-Xavier Standaert |
Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
LATINCRYPT ![In: Progress in Cryptology - LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2-4, 2019, Proceedings, pp. 150-172, 2019, Springer, 978-3-030-30529-1. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Avijit Dutta, Mridul Nandi, Suprita Talnikar |
Beyond Birthday Bound Secure MAC in Faulty Nonce Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT (1) ![In: Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I, pp. 437-466, 2019, Springer, 978-3-030-17652-5. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay |
On Misuse of Nonce-Misuse Resistance : Adapting Differential Fault Attacks on (few) CAESAR Winners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWASI ![In: IEEE 8th International Workshop on Advances in Sensors and Interfaces, IWASI 2019, Otranto, Italy, June 13-14, 2019, pp. 189-193, 2019, IEEE, 978-1-7281-0557-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
22 | Zhengan Huang, Junzuo Lai, Wenbin Chen 0003, Man Ho Au, Zhen Peng, Jin Li 0002 |
Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 25, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
22 | Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas |
Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 852, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
22 | Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam |
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 993, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
22 | Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda |
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2018, pp. 500, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP BibTeX RDF |
|
22 | Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam |
The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, Toronto, ON, Canada, October 15-19, 2018, pp. 1429-1440, 2018, ACM, 978-1-4503-5693-0. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas |
Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Selected Areas in Cryptography - SAC 2018 - 25th International Conference, Calgary, AB, Canada, August 15-17, 2018, Revised Selected Papers, pp. 257-277, 2018, Springer, 978-3-030-10969-1. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Serge Vaudenay, Damian Vizár |
Can Caesar Beat Galois? - Robustness of CAESAR Candidates Against Nonce Reusing and High Data Complexity Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security - 16th International Conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018, Proceedings, pp. 476-494, 2018, Springer, 978-3-319-93386-3. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Zhengan Huang, Junzuo Lai, Wenbin Chen 0003, Man Ho Au, Zhen Peng, Jin Li 0002 |
Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography (1) ![In: Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I, pp. 253-279, 2018, Springer, 978-3-319-76577-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda |
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO (1) ![In: Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I, pp. 631-661, 2018, Springer, 978-3-319-96883-4. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
22 | Sergey Agievich |
EHE: nonce misuse-resistant message authentication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 231, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
22 | Shay Gueron, Yehuda Lindell |
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2017, pp. 702, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
22 | Wenjie Qin, Kewei Lv |
Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ATIS ![In: Applications and Techniques in Information Security - 8th International Conference, ATIS 2017, Auckland, New Zealand, July 6-7, 2017, Proceedings, pp. 48-57, 2017, Springer, 978-981-10-5420-4. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Mathy Vanhoef, Frank Piessens |
Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, pp. 1313-1328, 2017, ACM, 978-1-4503-4946-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Shay Gueron, Yehuda Lindell |
Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, pp. 1019-1036, 2017, ACM, 978-1-4503-4946-8. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Xiaojuan Zhang 0003, Dongdai Lin |
Cryptanalysis of Acorn in Nonce-Reuse Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology - 13th International Conference, Inscrypt 2017, Xi'an, China, November 3-5, 2017, Revised Selected Papers, pp. 342-361, 2017, Springer, 978-3-319-75159-7. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Angelica Buerkin-Pontrelli, Daniel Swingley |
How infants map nonce phrases to scenes with objects and predicates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CogSci ![In: Proceedings of the 39th Annual Meeting of the Cognitive Science Society, CogSci 2017, London, UK, 16-29 July 2017, 2017, cognitivesciencesociety.org, 978-0-9911967-6-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
22 | Kaiyu Zhang, Sen Xu, Dawu Gu, Haihua Gu, Junrong Liu, Zheng Guo 0001, Ruitong Liu, Liang Liu, Xiaobo Hu |
Practical Partial-Nonce-Exposure Attack on ECC Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: 13th International Conference on Computational Intelligence and Security, CIS 2017, Hong Kong, China, December 15-18, 2017, pp. 248-252, 2017, IEEE Computer Society, 978-1-5386-4822-3. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
22 | Jie Zhang, Yuanliang Meng |
Structure-dependent tone sandhi in real and nonce disyllables in Shanghai Wu. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Phonetics ![In: J. Phonetics 54, pp. 169-201, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
22 | Benoît Cogliati, Yannick Seurin |
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 525, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | Dhiman Saha, Dipanwita Roy Chowdhury |
EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 623, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | Jörg Schwenk |
Nonce-based Kerberos is a Secure Delegated AKE Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 219, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic |
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 475, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | Mihir Bellare, Björn Tackmann |
Nonce-Based Cryptography: Retaining Security when Randomness Fails. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2016, pp. 290, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP BibTeX RDF |
|
22 | Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan, Abdullah Sharaf Alghamdi |
Cryptanalysis and improvement of 'a secure authentication scheme for telecare medical information system' with nonce verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Peer-to-Peer Netw. Appl. ![In: Peer-to-Peer Netw. Appl. 9(5), pp. 841-853, 2016. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|