The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for nonce with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1990-2004 (18) 2005-2006 (21) 2007-2008 (19) 2009-2012 (15) 2013-2015 (20) 2016-2017 (22) 2018-2019 (23) 2020 (16) 2021-2023 (24) 2024 (2)
Publication types (Num. hits)
article(89) inproceedings(91)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 102 occurrences of 67 keywords

Results
Found 180 publication records. Showing 180 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
186Erik Zenner Nonce Generators and the Nonce Reset Problem. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Nonce Reset, Nonce Generator, Cryptography, Security Engineering, Nonce
97Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i
97Peng Wang 0009, Dengguo Feng, Wenling Wu Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF nonce-based encryption, security model, modes of operation, Blockcipher, tweakable blockcipher
80Eun-Jun Yoon, Kee-Young Yoo Replay Attacks on Han et al.'s Chaotic Map Based Key Agreement Protocol Using Nonce. Search on Bibsonomy ICIC (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Protocol, Cryptanalysis, Key agreement, Chaotic maps, Nonce
71Fangyong Hou, Dawu Gu, Nong Xiao, Zhiping Cai Efficient disk encryption and verification through trusted nonce. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
71Phillip Rogaway Nonce-Based Symmetric Encryption. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Initialization vector, provable security, modes of operation, symmetric encryption, nonces
55Chang-Hyun Kim, Myungwhan Choi TCP Recovering Multiple Packet Losses over Wireless Links Using Nonce. Search on Bibsonomy ICOIN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
49Kouichi Sakurai, Tsuyoshi Takagi New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
44Jean Paul Degabriele, Vukasin Karadzic Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
44Jean Paul Degabriele, Vukasin Karadzic Overloading the Nonce: Rugged PRPs, Nonce-Set AEAD, and Order-Resilient Channels. Search on Bibsonomy CRYPTO (4) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
44Geng Wang, Haiyang Zhang, Fengmei Liu Security Proof of JAMBU under Nonce Respecting and Nonce Misuse Cases. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
42Junghyun Nam, Juryon Paik, Ung-Mo Kim, Dongho Won Constant-Round Authenticated Group Key Exchange with Logarithmic Computation Complexity. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF nonce-chained authentication, scalability, Cryptography, provable security, binary tree, group key exchange
42Debasis Giri, Parmeshwary Dayal Srivastava Cryptanalysis and the Improvement of Kim et al.'s Password Authentication Schemes. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Smart card, Attack, Timestamp, Nonce
38Wenbo Shi, Hyeong Seon Yoo Efficient Nonce-Based Authentication Scheme Using Token-Update. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
38J. Philip Benkard Nonce Functions. Search on Bibsonomy APL The full citation details ... 1990 DBLP  DOI  BibTeX  RDF APL
33Fangyong Hou, Dawu Gu, Nong Xiao, Fang Liu 0002, Hongjun He Performance and Consistency Improvements of Hash Tree Based Disk Storage Protection. Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Ayesha Altaf, M. Younus Javed, Attiq Ahmed Security Enhancements for Privacy and Key Management Protocol in IEEE 802.16e-2005. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Privcy and Key Management, security
33David A. McGrew, Scott R. Fluhrer The Security of the Extended Codebook (XCB) Mode of Operation. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
33Dayin Wang, Dongdai Lin, Wenling Wu OPMAC: One-Key Poly1305 MAC. Search on Bibsonomy Inscrypt The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Carter-Wegman MAC, Universal Hash Family, Block cipher, Message Authentication Code, Pseudorandom Function, Pseudorandom Permutation
33Dayin Wang, Dongdai Lin, Wenling Wu An Improved Poly1305 MAC. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
33Phillip Rogaway Authenticated-encryption with associated-data. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF OCB, associated-data problem, block-cipher usage, key separation, modes of operation, authenticated-encryption
26Rosario Gennaro Randomness in Cryptography. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF cryptography, predictable, randomness, nonce
22Yiming Gao, Jinghui Wang, Honggang Hu, Binang He Attacking ECDSA with Nonce Leakage by Lattice Sieving: Bridging the Gap with Fourier Analysis-based Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
22Shuai Liu, Jizhou Ren, Jie Guan, Bin Hu 0011, Sudong Ma, Hao Bai A Break Of Barrier To Classical Differential Fault Attack On The Nonce-Based Authenticated Encryption Algorithm. Search on Bibsonomy Comput. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
22Akiko Inoue, Chun Guo 0002, Kazuhiko Minematsu Nonce-misuse resilience of Romulus-N and GIFT-COFB. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sönmez Turan Resistance of Ascon Family Against Conditional Cube Attacks in Nonce-Misuse Setting. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22David Arps, Laura Kallmeyer, Younes Samih, Hassan Sajjad 0001 Multilingual Nonce Dependency Treebanks: Understanding how LLMs represent and process syntactic structure. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Matteo Golinelli, Francesco Bonomi, Bruno Crispo The Nonce-nce of Web Security: an Investigation of CSP Nonces Reuse. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Richard Ostertág On the usefulness of linear types for correct nonce use enforcement during compile time. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Luyao Xu, Zhengyi Dai, Baofeng Wu, Dongdai Lin Improved Attacks on (EC)DSA with Nonce Leakage by Lattice Sieving with Predicate. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Marco Macchetti A Novel Related Nonce Attack for ECDSA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
22Yao Sun, Shuai Chang A New Sieving Approach for Solving the HNP with One Bit of Nonce by Using Built-in Modulo Arithmetic. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
22Shunsuke Osaki, Noboru Kunihiro Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages. Search on Bibsonomy ICISC (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Matteo Golinelli, Francesco Bonomi, Bruno Crispo The Nonce-nce of Web Security: An Investigation of CSP Nonces Reuse. Search on Bibsonomy ESORICS Workshops (2) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
22Chao Sun, Thomas Espitau, Mehdi Tibouchi, Masayuki Abe Guessing Bits: Improved Lattice Attacks on (EC)DSA with Nonce Leakage. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Seth Hoffert Nonce-encrypting AEAD Modes with Farfalle. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
22Donghoon Chang, Deukjo Hong, Jinkeon Kang Conditional Cube Attacks on Ascon-128 and Ascon-80pq in a Nonce-misuse Setting. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
22Donghoon Chang, Deukjo Hong, Jinkeon Kang, Meltem Sönmez Turan Resistance of Ascon Family against Conditional Cube Attacks in Nonce-Misuse Setting. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
22Akiko Inoue, Chun Guo 0002, Kazuhiko Minematsu Nonce-Misuse Resilience of Romulus-N and GIFT-COFB. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
22Jules Baudrin, Anne Canteaut, Léo Perrin Practical Cube Attack against Nonce-Misused Ascon. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Sho Sugauchi, Satoshi Obana Fully Subliminal-Free Schnorr Signature for Nonce. Search on Bibsonomy CANDAR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Shay Gueron Counter Mode for Long Messages and a Long Nonce. Search on Bibsonomy CSCML The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
22Yu Long Chen, Bart Mennink, Bart Preneel Categorization of Faulty Nonce Misuse Resistant Message Authentication. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
22Khodakhast Bibak, Robert Ritchie 0001 Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Yu Long Chen, Bart Mennink, Bart Preneel Categorization of Faulty Nonce Misuse Resistant Message Authentication. Search on Bibsonomy ASIACRYPT (3) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22Monjur Alam, Baki Berkay Yilmaz, Frank Werner 0005, Niels Samwel, Alenka G. Zajic, Daniel Genkin, Yuval Yarom, Milos Prvulovic Nonce@Once: A Single-Trace EM Side Channel Attack on Several Constant-Time Elliptic Curve Implementations in Mobile Platforms. Search on Bibsonomy EuroS&P The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
22B. Arunkumar 0001, G. Kousalya 0001 Nonce reuse/misuse resistance authentication encryption schemes for modern TLS cipher suites and QUIC based web servers. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Laura M. Roberts, David Plonka Watching the Watchers: Nonce-based Inverse Surveillance to Remotely Detect Monitoring. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
22Na-Young Ahn, Dong Hoon Lee 0001 Secure Vehicle Communications Using Proof-of-Nonce Blockchain. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
22Dat Phuc Tran Song, Byoungjin Seok, Changhoon Lee HANMRE - An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches. Search on Bibsonomy Appl. Soft Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Mohit Sahni Online Certificate Status Protocol (OCSP) Nonce Extension. Search on Bibsonomy RFC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi 0002, Mehdi Tibouchi, Yuval Yarom LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
22Elena Andreeva 0001, Amit Singh Bhati, Damian Vizár Nonce-Misuse Security of the SAEF Authenticated Encryption mode. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
22Wonseok Choi 0002, ByeongHak Lee, Yeongmin Lee, Jooyoung Lee 0001 Improved Security Analysis for Nonce-based Enhanced Hash-then-Mask MACs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
22Avijit Dutta, Mridul Nandi BBB Secure Nonce Based MAC Using Public Permutations. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
22Wonseok Choi 0002, Akiko Inoue, ByeongHak Lee, Jooyoung Lee 0001, Eik List, Kazuhiko Minematsu, Yusuke Naito 0001 Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Diego F. Aranha, Felipe Rodrigues Novaes, Akira Takahashi 0002, Mehdi Tibouchi, Yuval Yarom LadderLeak: Breaking ECDSA with Less than One Bit of Nonce Leakage. Search on Bibsonomy CCS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Elena Andreeva 0001, Amit Singh Bhati, Damian Vizár Nonce-Misuse Security of the SAEF Authenticated Encryption Mode. Search on Bibsonomy SAC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Samuel Weiser, David Schrammel, Lukas Bodner, Raphael Spreitzer Big Numbers - Big Troubles: Systematically Analyzing Nonce Leakage in (EC)DSA Implementations. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2020 DBLP  BibTeX  RDF
22Wonseok Choi 0002, ByeongHak Lee, Yeongmin Lee, Jooyoung Lee 0001 Improved Security Analysis for Nonce-Based Enhanced Hash-then-Mask MACs. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Laura M. Roberts, David Plonka Watching the Watchers: Nonce-based Inverse Surveillance to Remotely Detect Monitoring. Search on Bibsonomy TMA The full citation details ... 2020 DBLP  BibTeX  RDF
22Avijit Dutta, Mridul Nandi BBB Secure Nonce Based MAC Using Public Permutations. Search on Bibsonomy AFRICACRYPT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
22Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda sfDWCDM+: A BBB secure nonce based MAC. Search on Bibsonomy Adv. Math. Commun. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Sandhya Koteshwara, Amitabh Das, Keshab K. Parhi Architecture Optimization and Performance Comparison of Nonce-Misuse-Resistant Authenticated Encryption Algorithms. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Tairong Shi, Jie Guan Real-time state recovery attack against MORUS in nonce-misuse setting. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Burong Kang, Xinyu Meng, Lei Zhang 0009, Yinxia Sun Nonce-Based Key Agreement Protocol Against Bad Randomness. Search on Bibsonomy Int. J. Found. Comput. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Shay Gueron, Adam Langley, Yehuda Lindell AES-GCM-SIV: Nonce Misuse-Resistant Authenticated Encryption. Search on Bibsonomy RFC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Avijit Dutta, Mridul Nandi, Suprita Talnikar Beyond Birthday Bound Secure MAC in Faulty Nonce Model. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
22Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay On Misuse of Nonce-Misuse Resistance: Adapting Differential Fault Attacks on (few) CAESAR Winners. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
22Patrick Kresmer, Alexander Zeh CCM-SIV: Single-PRF Nonce-Misuse-Resistant Authenticated Encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
22Mustafa Khairallah Forgery Attack on mixFeed in the Nonce-Misuse Scenario. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
22Joachim Breitner, Nadia Heninger Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
22Joachim Breitner, Nadia Heninger Biased Nonce Sense: Lattice Attacks Against Weak ECDSA Signatures in Cryptocurrencies. Search on Bibsonomy Financial Cryptography The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Chun Guo 0002, Olivier Pereira, Thomas Peters, François-Xavier Standaert Authenticated Encryption with Nonce Misuse and Physical Leakage: Definitions, Separation Results and First Construction - (Extended Abstract). Search on Bibsonomy LATINCRYPT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Avijit Dutta, Mridul Nandi, Suprita Talnikar Beyond Birthday Bound Secure MAC in Faulty Nonce Model. Search on Bibsonomy EUROCRYPT (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Mustafa Khairallah, Shivam Bhasin, Anupam Chattopadhyay On Misuse of Nonce-Misuse Resistance : Adapting Differential Fault Attacks on (few) CAESAR Winners. Search on Bibsonomy IWASI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
22Zhengan Huang, Junzuo Lai, Wenbin Chen 0003, Man Ho Au, Zhen Peng, Jin Li 0002 Hedged Nonce-Based Public-Key Encryption: Adaptive Security under Randomness Failures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
22Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas Fault Attacks on Nonce-based Authenticated Encryption: Application to Keyak and Ketje. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
22Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
22Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
22Viet Tung Hoang, Stefano Tessaro, Aishwarya Thiruvengadam The Multi-user Security of GCM, Revisited: Tight Bounds for Nonce Randomization. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Christoph Dobraunig, Stefan Mangard, Florian Mendel, Robert Primas Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje. Search on Bibsonomy SAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Serge Vaudenay, Damian Vizár Can Caesar Beat Galois? - Robustness of CAESAR Candidates Against Nonce Reusing and High Data Complexity Attacks. Search on Bibsonomy ACNS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Zhengan Huang, Junzuo Lai, Wenbin Chen 0003, Man Ho Au, Zhen Peng, Jin Li 0002 Hedged Nonce-Based Public-Key Encryption: Adaptive Security Under Randomness Failures. Search on Bibsonomy Public Key Cryptography (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Nilanjan Datta, Avijit Dutta, Mridul Nandi, Kan Yasuda Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC. Search on Bibsonomy CRYPTO (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
22Sergey Agievich EHE: nonce misuse-resistant message authentication. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
22Shay Gueron, Yehuda Lindell Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
22Wenjie Qin, Kewei Lv Rounding Technique's Application in Schnorr Signature Algorithm: Known Partially Most Significant Bits of Nonce. Search on Bibsonomy ATIS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Mathy Vanhoef, Frank Piessens Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Shay Gueron, Yehuda Lindell Better Bounds for Block Cipher Modes of Operation via Nonce-Based Key Derivation. Search on Bibsonomy CCS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Xiaojuan Zhang 0003, Dongdai Lin Cryptanalysis of Acorn in Nonce-Reuse Setting. Search on Bibsonomy Inscrypt The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Angelica Buerkin-Pontrelli, Daniel Swingley How infants map nonce phrases to scenes with objects and predicates. Search on Bibsonomy CogSci The full citation details ... 2017 DBLP  BibTeX  RDF
22Kaiyu Zhang, Sen Xu, Dawu Gu, Haihua Gu, Junrong Liu, Zheng Guo 0001, Ruitong Liu, Liang Liu, Xiaobo Hu Practical Partial-Nonce-Exposure Attack on ECC Algorithm. Search on Bibsonomy CIS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
22Jie Zhang, Yuanliang Meng Structure-dependent tone sandhi in real and nonce disyllables in Shanghai Wu. Search on Bibsonomy J. Phonetics The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
22Benoît Cogliati, Yannick Seurin EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
22Dhiman Saha, Dipanwita Roy Chowdhury EnCounter: On Breaking the Nonce Barrier in Differential Fault Analysis with a Case-Study on PAEQ. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
22Jörg Schwenk Nonce-based Kerberos is a Secure Delegated AKE Protocol. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
22Hanno Böck, Aaron Zauner, Sean Devlin, Juraj Somorovsky, Philipp Jovanovic Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
22Mihir Bellare, Björn Tackmann Nonce-Based Cryptography: Retaining Security when Randomness Fails. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
22Zeeshan Siddiqui, Abdul Hanan Abdullah, Muhammad Khurram Khan, Abdullah Sharaf Alghamdi Cryptanalysis and improvement of 'a secure authentication scheme for telecare medical information system' with nonce verification. Search on Bibsonomy Peer-to-Peer Netw. Appl. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 180 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license