The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for subkeys with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-2002 (16) 2003-2017 (15) 2023 (2)
Publication types (Num. hits)
article(10) inproceedings(23)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 24 occurrences of 22 keywords

Results
Found 33 publication records. Showing 33 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
89George I. Davida, David L. Wells, John B. Kam A Database Encryption System with Subkeys. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1981 DBLP  DOI  BibTeX  RDF subkeys, databases, encryption, data security, decryption
57Kyuyong Shin, Douglas S. Reeves, Injong Rhee Treat-before-trick : Free-riding prevention for BitTorrent-like peer-to-peer networks. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
57Philip Hawkes, Luke O'Connor On Applying Linear Cryptanalysis to IDEA. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
38Michel Abdalla, Mihir Bellare Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
34Wenjie Liu, Mengting Wang, Zixian Li Quantum All-Subkeys-Recovery Attacks on 6-round Feistel-2* Structure Based on Multi-Equations Quantum Claw Finding. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
34Wenjie Liu 0001, Mengting Wang, Zixian Li Quantum all-subkeys-recovery attacks on 6-round Feistel-2* structure based on multi-equations quantum claw finding. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
34Dong Yang, Wen-Feng Qi 0001, Tian Tian 0004 All-subkeys-recovery attacks on a variation of Feistel-2 block ciphers. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
34Takanori Isobe 0001, Kyoji Shibutani Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
34Takanori Isobe 0001, Kyoji Shibutani Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
34Takanori Isobe 0001, Kyoji Shibutani All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
34Min-Shiang Hwang, Wei-Pang Yang Multilevel Secure Database Encryption with Subkeys. Search on Bibsonomy Data Knowl. Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
34Thomas A. Bailey, R. Geoff Dromey Fast String Searching by Finding Subkeys in Subtext. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 1980 DBLP  DOI  BibTeX  RDF
19Erez Shmueli, Ronen Vaisenberg, Yuval Elovici, Chanan Glezer Database encryption: an overview of contemporary challenges and design considerations. Search on Bibsonomy SIGMOD Rec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Xiaoyun Wang 0001, Hongbo Yu, Wei Wang 0035, Haina Zhang, Tao Zhan Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MDx-MAC, Distinguishing attack, MD5, Key recovery, HMAC, NMAC
19Jiali Choy, Huihui Yap Impossible Boomerang Attack for Block Cipher Structures. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Impossible Boomerang Attack, Impossible Boomerang Distinguishers, Block Ciphers
19Eli Biham, Orr Dunkelman, Nathan Keller A Unified Approach to Related-Key Attacks. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19YiWei Zhang, YuMin Wang, XuBang Shen A chaos-based image encryption algorithm using alternate structure. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF chaotic encryption, general cat-map, OCML, image encryption
19Naga M. Kosaraju, Murali R. Varanasi, Saraju P. Mohanty A High-Performance VLSI Architecture for Advanced Encryption Standard (AES) Algorithm. Search on Bibsonomy VLSI Design The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Rémy Daudigny, Hervé Ledig, Frédéric Muller, Frédéric Valette SCARE of the DES. Search on Bibsonomy ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Hua Li, Jianzhou Li A High Performance Sub-Pipelined Architecture for AES. Search on Bibsonomy ICCD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF sub-pipelined architecture, FPGA, cryptography, AES
19Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee 0002 Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CIKS-1, Related Key differential attack, Data-dependent rotation, SPECTR-H64
19Trevor Perrin Public key distribution through "cryptoIDs". Search on Bibsonomy NSPW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptoIDs, key management, fingerprints, key distribution, public key infrastructure
19Alexander A. Moldovyan, Nick A. Moldovyan A Cipher Based on Data-Dependent Permutations. Search on Bibsonomy J. Cryptol. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee 0002, Hyungjin Yang, Jongin Lim 0001 A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF CIKS-1(Cipher with Internal Key Scheduling), Block Cipher, Linear Cryptanalysis, Data-Dependent Permutation
19Yukio Mitsuyama, Zaldy Andales, Takao Onoye, Isao Shirakawa A dynamically reconfigurable hardware-based cipher chip. Search on Bibsonomy ASP-DAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Yukio Mitsuyama, Zaldy Andales, Takao Onoye, Isao Shirakawa VLSI architecture of dynamically reconfigurable hardware-based cipher. Search on Bibsonomy ISCAS (4) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Nick D. Goots, Alexander A. Moldovyan, Nick A. Moldovyan Fast Encryption Algorithm Spectr-H64. Search on Bibsonomy MMM-ACNS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Alex Biryukov, David A. Wagner 0001 Advanced Slide Attacks. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Cameron Patterson A Dynamic FPGA Implementation of the Serpent Block Cipher. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Gary Carter, Ed Dawson, Lauren Nielsen Key Schedules of Iterative Block Ciphers. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Alex Biryukov, Eyal Kushilevitz Improved Cryptanalysis of RC5. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF RGS, Block ciphers, differential cryptanalysis
19Kazuo Ohta, Kazumaro Aoki Linear Cryptanalysis of the Fast Data Encipherment Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
19Xuejia Lai, James L. Massey, Sean Murphy Markov Ciphers and Differential Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #33 of 33 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license