The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "FSE"( http://dblp.L3S.de/Venues/FSE )

URL (DBLP): http://dblp.uni-trier.de/db/conf/fse

Publication years (Num. hits)
1993 (26) 1994 (30) 1995-1996 (20) 1997 (25) 1998 (21) 1999 (23) 2000 (21) 2001 (29) 2002 (23) 2003 (28) 2004 (32) 2005 (30) 2006 (28) 2007 (29) 2008 (31) 2009 (25) 2010 (22) 2011 (24) 2012 (26) 2013 (30) 2014 (32) 2015 (30) 2016 (30)
Publication types (Num. hits)
inproceedings(592) proceedings(23)
Venues (Conferences, Journals, ...)
FSE(615)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 399 occurrences of 174 keywords

Results
Found 615 publication records. Showing 615 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Yosuke Todo, Masakatu Morii Bit-Based Division Property and Application to Simon Family. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christoph Dobraunig, Maria Eichlseder, Florian Mendel Analysis of the Kupyna-256 Hash Function. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christina Boura, Avik Chakraborti, Gaëtan Leurent, Goutam Paul 0001, Dhiman Saha, Hadi Soleimany, Valentin Suder Key Recovery Attack Against 2.5-Round \pi -Cipher. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel 0001 RIV for Robust Authenticated Encryption. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pascal Sasdrich, Amir Moradi 0001, Tim Güneysu White-Box Cryptography in the Gray Box - - A Hardware Implementation and its Side Channels -. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Li Lin 0003, Wenling Wu, Yafei Zheng Automatic Search for Key-Bridging Technique: Applications to LBlock and TWINE. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nasour Bagheri, Tao Huang 0015, Keting Jia, Florian Mendel, Yu Sasaki Cryptanalysis of Reduced NORX. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Subhadeep Banik, Takanori Isobe 0001 Cryptanalysis of the Full Spritz Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Peng Wang 0009, Yuling Li, Liting Zhang, Kaiyan Zheng Related-Key Almost Universal Hash Functions: Definitions, Constructions and Applications. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Anne Canteaut, Yann Rotella Attacks Against Filter Generators Exploiting Monomial Mappings. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Vesselin Velichkov, Yann Le Corre Automatic Search for the Best Trails in ARX: Application to Block Cipher Speck. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Léo Perrin, Aleksei Udovenko Algebraic Insights into the Secret Feistel Network. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jérémy Jean, Ivica Nikolic Efficient Design Strategies Based on the AES Round Function. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun 0001, Long Wen, Andrey Bogdanov Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Patrick Derbez Note on Impossible Differential Attacks. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir Verifiable Side-Channel Security of Cryptographic Implementations: Constant-Time MEE-CBC. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ko Stoffelen Optimizing S-Box Implementations for Several Criteria Using SAT Solvers. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Huaifeng Chen, Xiaoyun Wang 0001 Improved Linear Hull Attack on Round-Reduced Simon with Dynamic Key-Guessing Techniques. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nathan Chenette, Kevin Lewi, Stephen A. Weis, David J. Wu 0001 Practical Order-Revealing Encryption with Limited Leakage. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Houssem Maghrebi, Victor Servant, Julien Bringer There Is Wisdom in Harnessing the Strengths of Your Enemy: Customized Encoding to Thwart Side-Channel Attacks. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Anne Canteaut, Sergiu Carpov, Caroline Fontaine, Tancrède Lepoint, María Naya-Plasencia, Pascal Paillier, Renaud Sirdey Stream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext Compression. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kai Fu, Meiqin Wang, Yinghua Guo, Siwei Sun, Lei Hu MILP-Based Automatic Search Algorithms for Differential and Linear Trails for Speck. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Meicheng Liu, Siang Meng Sim Lightweight MDS Generalized Circulant Matrices. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yongqiang Li 0001, Mingsheng Wang On the Construction of Lightweight Circulant Involutory MDS Matrices. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pooya Farshim, Arno Mittelbach Modeling Random Oracles Under Unpredictable Queries. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yusuke Naito 0001, Kan Yasuda New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Oscar Reparaz Detecting Flawed Masking Schemes with Leakage Detection Tests. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thomas Peyrin (eds.) Fast Software Encryption - 23rd International Conference, FSE 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Benoît Cogliati, Yannick Seurin Strengthening the Known-Key Security Notion for Block Ciphers. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Atul Luykx, Bart Preneel, Elmar Tischhauser, Kan Yasuda A MAC Mode for Lightweight Block Ciphers. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Christoph Dobraunig, Maria Eichlseder, Florian Mendel Related-Key Forgeries for Prøst-OTR. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Leibo Li, Keting Jia, Xiaoyun Wang 0001, Xiaoyang Dong Meet-in-the-Middle Technique for Truncated Differential and Its Applications to CLEFIA and Camellia. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Bart Mennink Optimally Secure Tweakable Blockciphers. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Andrey Bogdanov, Martin M. Lauridsen, Elmar Tischhauser Comb to Pipeline: Fast Software Encryption Revisited. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tao Huang 0015, Ivan Tjuawinata, Hongjun Wu 0001 Differential-Linear Cryptanalysis of ICEPOLE. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Céline Blondeau, Marine Minier Analysis of Impossible, Integral and Zero-Correlation Attacks on Type-II Generalized Feistel Networks Using the Matrix Method. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Patrick Derbez, Léo Perrin Differential Analysis and Meet-in-the-Middle Attack Against Round-Reduced TWINE. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Martin M. Lauridsen, Christian Rechberger Linear Distinguishers in the Key-less Setting: Application to PRESENT. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Reza Reyhanitabar, Serge Vaudenay, Damian Vizár Boosting OMD for Almost Free Authentication of Associated Data. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Tyge Tiessen, Lars R. Knudsen, Stefan Kölbl, Martin M. Lauridsen Security of the AES with a Secret S-Box. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata GCM Security Bounds Reconsidered. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Ryoma Ito 0001, Atsuko Miyaji New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld Rotational Cryptanalysis of ARX Revisited. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Peter Gazi, Jooyoung Lee 0001, Yannick Seurin, John P. Steinberger, Stefano Tessaro Relaxing Full-Codebook Security: A Refined Analysis of Key-Length Extension Schemes. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Siang Meng Sim, Khoongming Khoo, Frédérique E. Oggier, Thomas Peyrin Lightweight MDS Involution Matrices. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Carlos Cid, Christian Rechberger (eds.) Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Thomas Peyrin, Siang Meng Sim, Lei Wang 0031, Guoyan Zhang Cryptanalysis of JAMBU. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Wentao Zhang, Zhenzhen Bao, Vincent Rijmen, Meicheng Liu A New Classification of 4-bit Optimal S-boxes and Its Application to PRESENT, RECTANGLE and SPONGENT. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Philipp Jovanovic, Samuel Neves Practical Cryptanalysis of the Open Smart Grid Protocol. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jean Paul Degabriele, Pooya Farshim, Bertram Poettering A More Cautious Approach to Security Against Mass Surveillance. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Gregor Leander (eds.) Fast Software Encryption - 22nd International Workshop, FSE 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jérémy Jean, Ivica Nikolic Internal Differential Boomerangs: Practical Analysis of the Round-Reduced Keccak- f f Permutation. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Céline Blondeau, Aslí Bay, Serge Vaudenay Protecting Against Multidimensional Linear and Truncated Differential Cryptanalysis by Decorrelation. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Achiya Bar-On Improved Higher-Order Differential Attacks on MISTY1. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Cezary Glowacz, Vincent Grosso, Romain Poussier, Joachim Schüth, François-Xavier Standaert Simpler and More Efficient Rank Estimation for Side-Channel Security Assessment. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Pooya Farshim, Gordon Procter The Related-Key Security of Iterated Even-Mansour Ciphers. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, Johann Großschädl, Mehdi Tibouchi, Praveen Kumar Vadnala Conversion from Arithmetic to Boolean Masking with Logarithmic Complexity. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Elena Andreeva 0001, Joan Daemen, Bart Mennink, Gilles Van Assche Security of Keyed Sponge Constructions Using a Modular Proof Approach. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Patrick Derbez, Léo Perrin Meet-in-the-Middle Attacks and Structural Analysis of Round-Reduced PRINCE. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Frederik Armknecht, Vasily Mikhalev On Lightweight Stream Ciphers with Shorter Internal States. Search on Bibsonomy FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Maria Eichlseder, Florian Mendel, Martin Schläffer Branching Heuristics in Differential Collision Search with Applications to SHA-512. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tetsu Iwata, Kazuhiko Minematsu, Jian Guo 0001, Sumio Morioka CLOC: Authenticated Encryption for Short Input. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel 0001 Differential Cryptanalysis of Round-Reduced Simon and Speck. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Daniel Augot, Matthieu Finiasz Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Benoit Cogliati, Rodolphe Lampe, Jacques Patarin The Indistinguishability of the XOR of k Permutations. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Anne Canteaut, Thomas Fuhr 0001, Henri Gilbert, María Naya-Plasencia, Jean-René Reinhard Multiple Differential Cryptanalysis of Round-Reduced PRINCE. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert, Kerem Varici LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hadi Soleimany Probabilistic Slide Cryptanalysis and Its Applications to LED-64 and Zorro. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Takanori Isobe 0001, Kyoji Shibutani Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt Plaintext Recovery Attacks Against WPA/TKIP. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Léo Perrin, Dmitry Khovratovich Collision Spectrum, Entropy Loss, T-Sponges, and Cryptanalysis of GLUON-64. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Elena Andreeva 0001, Atul Luykx, Bart Mennink, Kan Yasuda COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Guo-qiang Liu, Chen-Hui Jin, Chuan-Da Qi Improved Slender-Set Linear Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Manuel Barbosa, Pooya Farshim The Related-Key Analysis of Feistel Constructions. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Leibo Li, Keting Jia, Xiaoyun Wang 0001 Improved Single-Key Attacks on 9-Round AES-192/256. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Virginie Lallemand, María Naya-Plasencia Cryptanalysis of KLEIN. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shiho Moriai (eds.) Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sourav Sen Gupta 0001, Subhamoy Maitra, Willi Meier, Goutam Paul 0001, Santanu Sarkar 0001 Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abhishek Banerjee 0001, Hai Brenner, Gaëtan Leurent, Chris Peikert, Alon Rosen SPRING: Fast Pseudorandom Functions from Rounded Ring Products. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mridul Nandi On the Minimum Number of Multiplications Necessary for Universal Hash Functions. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Elena Andreeva 0001, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Itai Dinur, Jérémy Jean Cryptanalysis of FIDES. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Arnab Roy 0005, Vesselin Velichkov Differential Analysis of Block Ciphers SIMON and SPECK. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tetsu Iwata, Lei Wang 0031 Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jian Guo 0001, Yu Sasaki, Lei Wang 0031, Meiqin Wang, Long Wen Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rodolphe Lampe, Yannick Seurin Security Analysis of Key-Alternating Feistel Ciphers. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Florian Mendel, Vincent Rijmen, Martin Schläffer Collision Attack on 5 Rounds of Grøstl. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Alexandra Boldyreva, Nathan Chenette Efficient Fuzzy Search on Encrypted Data. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Thomas Fuhr 0001, Brice Minaud Match Box Meet-in-the-Middle Attack Against KATAN. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Farzaneh Abed, Scott R. Fluhrer, Christian Forler, Eik List, Stefan Lucks, David A. McGrew, Jakob Wenzel 0001 Pipelineable On-line Encryption. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Céline Blondeau, Gregor Leander, Kaisa Nyberg Differential-Linear Cryptanalysis Revisited. Search on Bibsonomy FSE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Markku-Juhani O. Saarinen Related-Key Attacks Against Full Hummingbird-2. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche Higher-Order Side Channel Security and Mask Refreshing. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Pierre-Alain Fouque, Thomas Vannet Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gaëtan Leurent Time-Memory Trade-Offs for Near-Collisions. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg, Huiling Zhang, Lei Zhang 0012, Yanfeng Wang Reflection Cryptanalysis of PRINCE-Like Ciphers. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mitsuru Matsui, Yumiko Murakami Minimalism of Software Implementation - Extensive Performance Analysis of Symmetric Primitives on the RL78 Microcontroller. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Itai Dinur, Orr Dunkelman, Adi Shamir Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ivica Nikolic, Lei Wang 0031, Shuang Wu Cryptanalysis of Round-Reduced \mathttLED. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 615 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license