The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for tweak with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-2005 (17) 2006-2008 (18) 2009-2016 (18) 2017-2020 (18) 2021-2023 (16) 2024 (2)
Publication types (Num. hits)
article(36) inproceedings(53)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 45 occurrences of 41 keywords

Results
Found 89 publication records. Showing 89 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
88Phillip Rogaway Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
53David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu On Tweaking Luby-Rackoff Blockciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
53Lars Karlsson Planning, Truth Criteria and the Systematic Approach to Action and Change. Search on Bibsonomy ISMIS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
52Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. Search on Bibsonomy INDOCRYPT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
52Chun Guo 0002, Jian Guo 0001, Eik List, Ling Song 0001 Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT). Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
52Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas López, Mridul Nandi, Yu Sasaki Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
36Kan Yasuda A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF birthday barrier, tweak, quasi-random function, message authentication code, mode of operation, checksum, pseudo-random function, compression function, domain extension
35Moses D. Liskov, Ronald L. Rivest, David A. Wagner 0001 Tweakable Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF tweakable block ciphers, initialization vector, block ciphers, modes of operation
26Wonseok Choi 0002, Jooyoung Lee 0001, Yeongmin Lee Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Yunxue Lin, Ling Sun Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48. Search on Bibsonomy ACNS (3) The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Zhenzhen Guo, Gaoli Wang, Orr Dunkelman, Yinxue Pan, Shengyuan Liu Tweakable SM4: How to tweak SM4 into tweakable block ciphers? Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Zhongliang Zhang, Zhen Qin, Chun Guo 0002 Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Yaobin Shen, François-Xavier Standaert Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
26Yaobin Shen, François-Xavier Standaert Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Benoît Cogliati, Jordan Ethan, Ashwin Jha, Soumya Kanti Saha On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Jisu Ryou, Kihun Lee, Joongseek Lee "You said da da...": A Short Echoing Tweak for Journaling with VA. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Jared Gaskin, Bechir Hamdaoui, Weng-Keen Wong Tweak: Towards Portable Deep Learning Models for Domain-Agnostic LoRa Device Authentication. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Benoît Cogliati, Jérémy Jean, Thomas Peyrin, Yannick Seurin A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
26Wonseok Choi 0002, Jooyoung Lee 0001, Yeongmin Lee Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
26Gregor Leander, Shahram Rasoolzadeh Weak Tweak-Keys for the CRAFT Block Cipher. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Jared Gaskin, Bechir Hamdaoui, Weng-Keen Wong Tweak: Towards Portable Deep Learning Models for Domain-Agnostic LoRa Device Authentication. Search on Bibsonomy CNS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Anu Dhankhar, Sapna Juneja, Abhinav Juneja, Vikram Bali Kernel Parameter Tuning to Tweak the Performance of Classifiers for Identification of Heart Diseases. Search on Bibsonomy Int. J. E Health Medical Commun. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang 0001, Siu-Ming Yiu Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
26Jörg Keller 0001 How to Tweak a Cryptographic Permutation by Direct Manipulation. Search on Bibsonomy EICC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang 0001, Siu-Ming Yiu Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. Search on Bibsonomy SAC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Jeroen Delvaux On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
26Hao Guo, Siwei Sun, Danping Shi, Ling Sun 0001, Yao Sun, Lei Hu, Meiqin Wang Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
26Hao Guo, Siwei Sun, Danping Shi, Ling Sun 0001, Yao Sun, Lei Hu, Meiqin Wang Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Zhenzhen Bao, Chun Guo 0002, Jian Guo 0001, Ling Song 0001 TNT: How to Tweak a Block Cipher. Search on Bibsonomy EUROCRYPT (2) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Jeroen Delvaux On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis. Search on Bibsonomy AsianHOST The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Rui Zong, Xiaoyang Dong MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Muzhou Li, Kai Hu 0001, Meiqin Wang Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
26Jacob Appelbaum, Chloe Martindale, Peter Wu Tiny WireGuard Tweak. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
26Muzhou Li, Kai Hu 0001, Meiqin Wang Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Jacob Appelbaum, Chloe Martindale, Peter Wu Tiny WireGuard Tweak. Search on Bibsonomy AFRICACRYPT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Rui Zong, Xiaoyang Dong, Xiaoyun Wang 0001 MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
26Maria Eichlseder, Daniel Kales Clustering Related-Tweak Characteristics: Application to MANTIS-6. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Athmane Seghier Progressive Two-bits Tweak for Linear Redundancy reduction from Finite Field S-Boxes. Search on Bibsonomy ICCNS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Aruna Gawade, Narendra Shekokar Lightweight Cipher Using GRP Bit Permutation and Tweak. Search on Bibsonomy ISDA (1) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Maria Eichlseder, Daniel Kales Clustering Related-Tweak Characteristics: Application to MANTIS-6. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
26Krzysztof Hajto, Konrad Kamieniecki, Krzysztof Misztal, Przemyslaw Spurek Split-and-merge Tweak in Cross Entropy Clustering. Search on Bibsonomy CISIM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Shoichi Hirose, Atsushi Yabumoto A Tweak for a PRF Mode of a Compression Function and Its Applications. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
26Raphael Bost, Olivier Sanders Trick or Tweak: On the (In)security of OTR's Tweaks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
26Shoichi Hirose, Atsushi Yabumoto A Tweak for a PRF Mode of a Compression Function and Its Applications. Search on Bibsonomy SECITC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Raphael Bost, Olivier Sanders Trick or Tweak: On the (In)security of OTR's Tweaks. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Thomas Peyrin, Yannick Seurin Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers. Search on Bibsonomy CRYPTO (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Hayato Kobayashi, Kazuhiko Minematsu, Tetsu Iwata Optimality of Tweak Functions in CLOC. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Benoit Cogliati, Yannick Seurin Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
26Kazuhiko Minematsu, Tetsu Iwata Tweak-Length Extension for Tweakable Blockciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
26Thomas Peyrin, Yannick Seurin Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
26Benoît Cogliati, Yannick Seurin Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing. Search on Bibsonomy ASIACRYPT (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Kazuhiko Minematsu, Tetsu Iwata Tweak-Length Extension for Tweakable Blockciphers. Search on Bibsonomy IMACC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Alexandra Jimborean, Konstantinos Koukos, Vasileios Spiliopoulos, David Black-Schaffer, Stefanos Kaxiras Fix the code. Don't tweak the hardware: A new compiler approach to Voltage-Frequency scaling. Search on Bibsonomy CGO The full citation details ... 2014 DBLP  BibTeX  RDF
26Stevan Harnad United Kingdom's Open Access Policy Urgently Needs a Tweak. Search on Bibsonomy D Lib Mag. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Kate Starbird, Jeannie A. Stamberger Tweak the tweet: Leveraging microblogging proliferation with a prescriptive syntax to support citizen reporting. Search on Bibsonomy ISCRAM The full citation details ... 2010 DBLP  BibTeX  RDF
26Scott Petill Tweak. Search on Bibsonomy SIGGRAPH Abstracts and Applications The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Tad Hurst Flexible 3D searching: The directed tweak technique. Search on Bibsonomy J. Chem. Inf. Comput. Sci. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
18Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, William H. Sanders Blackbox prediction of the impact of DVFS on end-to-end performance of multitier systems. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
18Stefano Di Carlo, Ernesto Sánchez 0001, Alberto Scionti, Giovanni Squillero, Alberto Paolo Tonda, Matteo Falasconi Towards drift correction in chemical sensors using an evolutionary strategy. Search on Bibsonomy GECCO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF artificial olfaction, drift correction, evolutionary strategies
18Itai Dinur, Adi Shamir Cube Attacks on Tweakable Black Box Polynomials. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cube attacks, tweakable black box polynomials, Cryptanalysis, stream ciphers, algebraic attacks, Trivium
18Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei 0001, Josef Pieprzyk Extensions of the Cube Attack Based on Low Degree Annihilators. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cube Attack, Low-Degree Annihilators, Algebraic Attack
18Daniele Quercia, Stephen Hailes, Licia Capra MobiRate: making mobile raters stick to their word. Search on Bibsonomy UbiComp The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed reputation (trust) systems, mobile systems
18Jens Lincke, Robert Hirschfeld, Michael Rüger, Maic Masuch SophieScript - Active Content in Multimedia Documents. Search on Bibsonomy C5 The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Csaba A. Boer, Yvo A. Saanen Controls: Emulation to improve the performance of container terminals. Search on Bibsonomy WSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Debrup Chakraborty, Mridul Nandi An Improved Security Bound for HCTR. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Monika Andersson, Maria Nordmark Bringing the web to the shop floor. Search on Bibsonomy NordiCHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF interaction, user experience, retail, contextual design
18Tushar Kumar, Romain Cledat, Jaswanth Sreeram, Santosh Pande Statistically Analyzing Execution Variance for Soft Real-Time Applications. Search on Bibsonomy LCPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Rebecca Wirfs-Brock Giving Design Advice. Search on Bibsonomy IEEE Softw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cognitive biases
18Rosen Diankov, James Kuffner Randomized statistical path planning. Search on Bibsonomy IROS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Joo Yeon Cho, Josef Pieprzyk Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Crossword Puzzle Attack, NLSv2, Stream Ciphers, Distinguishing Attacks, eSTREAM, NLS
18Raphael C.-W. Phan, Bok-Min Goi On the Analysis and Design of a Family Tree of Smart Card Based User Authentication Schemes. Search on Bibsonomy UIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
18Laurel M. Sheppard Visual Effects and Video Analysis Lead to Olympics Victories. Search on Bibsonomy IEEE Computer Graphics and Applications The full citation details ... 2006 DBLP  DOI  BibTeX  RDF biomechanics, Olympics
18Scott Kircher, Michael Garland Editing arbitrarily deforming surface animations. Search on Bibsonomy ACM Trans. Graph. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF adaptive wavelets, deforming surface editing, mesh signal processing, pyramid schemes, multiresolution editing
18Kazuhiko Minematsu Improved Security Analysis of XEX and LRW Modes. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Koji Yokokawa Script Synthesis Tool for Non-Experienced Programmers. Search on Bibsonomy C5 The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Jan-Phillip Tiesel, Jörn Loviscach A Mobile Low-Cost Motion Capture System Based on Accelerometers. Search on Bibsonomy ISVC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
18Andy C. Bavier, Nick Feamster, Mark Huang, Larry L. Peterson, Jennifer Rexford In VINI veritas: realistic and controlled network experimentation. Search on Bibsonomy SIGCOMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF internet, routing, architecture, virtualization, experimentation
18Alexander S. Klyubin, Daniel Polani, Chrystopher L. Nehaniv All Else Being Equal Be Empowered. Search on Bibsonomy ECAL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Peng Wang 0009, Dengguo Feng, Wenling Wu HCTR: A Variable-Input-Length Enciphering Mode. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF disk sector encryption, modes of operation, symmetric encryption, Blockcipher, tweakable blockcipher
18Maic Masuch, Michael Rüger Challenges in Collaborative Game Design Developing Learning Environments for Creating Games. Search on Bibsonomy C5 The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Alexander S. Klyubin, Daniel Polani, Chrystopher L. Nehaniv Empowerment: a universal agent-centric measure of control. Search on Bibsonomy Congress on Evolutionary Computation The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
18Ron Wilson, Joe Gianelli, Chris Hamlin, Ken McElvain, Steve Leibson, Ivo Bolson, Rich Tobias, Raul Camposano Structured/platform ASIC apprentices: which platform will survive your board room? Search on Bibsonomy DAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF programmable ASIC platforms, digital design
18Bowen Hui, Sotirios Liaskos, John Mylopoulos Requirements Analysis for Customizable Software Goals-Skills-Preferences Framework. Search on Bibsonomy RE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Richard Rasala Embryonic object versus mature object: object-oriented style and pedagogical theme. Search on Bibsonomy ITiCSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF eXtreme encapsulation, mature object
18Serge Vaudenay The Security of DSA and ECDSA. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Joanne Fuller, William Millan Linear Redundancy in S-Boxes. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
18Fadi A. Aloul, Igor L. Markov, Karem A. Sakallah FORCE: a fast and easy-to-implement variable-ordering heuristic. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF partitioning, placement, SAT, BDDs, hypergraph, CNF, pre-processing, backtrack search, variable order
18Richard L. Baskerville, Linda Levine, Jan Pries-Heje, Balasubramaniam Ramesh, Sandra Slaughter How Internet Software Companies Negotiate Quality. Search on Bibsonomy Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Diana Patterson The myth and realities of C.A.S.E. for documentation. Search on Bibsonomy SIGDOC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #89 of 89 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license