|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 27 occurrences of 25 keywords
|
|
|
Results
Found 37 publication records. Showing 37 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Frederik Armknecht, Stefan Lucks (eds.) |
Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers  |
WEWoRC  |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Erik Tews, Julian Wälde, Michael Weiner |
Breaking DVB-CSA.  |
WEWoRC  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marián Kühnel |
RSA Vulnerabilities with Small Prime Difference.  |
WEWoRC  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Onur Koçak, Nese Öztop |
Cryptanalysis of TWIS Block Cipher.  |
WEWoRC  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michelle Kendall, Keith M. Martin |
On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks.  |
WEWoRC  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Robert Niebuhr, Pierre-Louis Cayrel |
Broadcast Attacks against Code-Based Schemes.  |
WEWoRC  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xinxin Fan, Guang Gong |
On the Security of Hummingbird-2 against Side Channel Cube Attacks.  |
WEWoRC  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Timo Bartkewitz, Tim Güneysu |
Full Lattice Basis Reduction on Graphics Cards.  |
WEWoRC  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Aysajan Abidin, Jan-Åke Larsson |
New Universal Hash Functions.  |
WEWoRC  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zoya Dyka, Peter Langendörfer, Frank Vater |
Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2 k ).  |
WEWoRC  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ewan Fleischmann, Christian Forler, Stefan Lucks |
Γ-MAC[H, P] - A New Universal MAC Scheme.  |
WEWoRC  |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Lucks, Ahmad-Reza Sadeghi, Christopher Wolf (eds.) |
Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers  |
WEWoRC  |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Rei Yoshida, Rie Shigetomi, Kazuki Yoshizoe, Akira Otsuka, Hideki Imai |
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services.  |
WEWoRC  |
2007 |
DBLP DOI BibTeX RDF |
Context-dependent Service, Randomized Response Technique, Privacy Protection |
1 | Michael Beiter |
Combiner Driven Management Models and Their Applications.  |
WEWoRC  |
2007 |
DBLP DOI BibTeX RDF |
multi-time secret sharing, threshold schemes with update capabilities, secret sharing, management models |
1 | Sebastiaan Indesteege, Bart Preneel |
Preimages for Reduced-Round Tiger.  |
WEWoRC  |
2007 |
DBLP DOI BibTeX RDF |
hash functions, preimages, Tiger |
1 | Marko Hölbl, Christian Rechberger, Tatjana Welzer |
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256.  |
WEWoRC  |
2007 |
DBLP DOI BibTeX RDF |
differential collision search, hash function, conditions, SHA-256 |
1 | Tim Güneysu, Christof Paar, Sven Schäge |
Efficient Hash Collision Search Strategies on Special-Purpose Hardware.  |
WEWoRC  |
2007 |
DBLP DOI BibTeX RDF |
Crypto Attacks, Hash functions, Special-purpose Hardware |
1 | Rupert J. Hartung |
Cryptography Based on Quadratic Forms: Complexity Considerations.  |
WEWoRC  |
2007 |
DBLP DOI BibTeX RDF |
|
1 | María Naya-Plasencia |
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation.  |
WEWoRC  |
2007 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack |
1 | Anja Korsten |
Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups.  |
WEWoRC  |
2007 |
DBLP DOI BibTeX RDF |
MOR cryptosystem, inner automorphism problem, public key cryptography, discrete logarithm problem, non-abelian group |
1 | Gautham Sekar, Souradyuti Paul, Bart Preneel |
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B.  |
WEWoRC  |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Léonard Dallot |
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme.  |
WEWoRC  |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Waldyr D. Benits Junior, Steven D. Galbraith |
The GPS Identification Scheme Using Frobenius Expansions.  |
WEWoRC  |
2007 |
DBLP DOI BibTeX RDF |
GPS identificaion scheme, Elliptic Curves, Frobenius expansions |
1 | Nicolas T. Courtois, Blandine Debraize |
Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts.  |
WEWoRC  |
2007 |
DBLP DOI BibTeX RDF |
algebraic attacks on block ciphers, Gröbner bases, design of S-boxes, Rijndael, algebraic immunity, Serpent, multivariate equations |
1 | Adil Alsaid, Chris J. Mitchell |
A Scanning Tool for PC Root Public Key Stores.  |
WEWoRC  |
2005 |
DBLP BibTeX RDF |
|
1 | Christopher Wolf, Stefan Lucks, Po-Wah Yau (eds.) |
WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium  |
WEWoRC  |
2005 |
DBLP BibTeX RDF |
|
1 | Jaechul Sung, Jongsung Kim, Changhoon Lee, Seokhie Hong |
Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds.  |
WEWoRC  |
2005 |
DBLP BibTeX RDF |
|
1 | Frederik Armknecht |
Algebraic Attacks and Annihilators.  |
WEWoRC  |
2005 |
DBLP BibTeX RDF |
|
1 | Heiko Stamer |
Efficient Electronic Gambling: An Extended Implementation of the Toolbox for Mental Card Games.  |
WEWoRC  |
2005 |
DBLP BibTeX RDF |
|
1 | Marie Virat |
A cryptosystem "à la" ElGamal on an elliptic curve over Fp [epsilon].  |
WEWoRC  |
2005 |
DBLP BibTeX RDF |
|
1 | Alexandre Ruiz, Jorge Luis Villar |
Publicly Verfiable Secret Sharing from Paillier's Cryptosystem.  |
WEWoRC  |
2005 |
DBLP BibTeX RDF |
|
1 | Cédric Lauradoux |
Collision attacks on processors with cache and countermeasures.  |
WEWoRC  |
2005 |
DBLP BibTeX RDF |
|
1 | Stefan Lucks, Nico Schmoigl, Emin Islam Tatli |
Issues on Designing a Cryptographic Compiler.  |
WEWoRC  |
2005 |
DBLP BibTeX RDF |
|
1 | Andrey Sidorenko, Berry Schoenmakers |
State Recovery Attacks on Pseudorandom Generators.  |
WEWoRC  |
2005 |
DBLP BibTeX RDF |
|
1 | Eabhnat Ní Fhloinn, Michael Purser |
Applications of Hiding in RSA.  |
WEWoRC  |
2005 |
DBLP BibTeX RDF |
|
1 | Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Analysis of simplified variants of SHA-256.  |
WEWoRC  |
2005 |
DBLP BibTeX RDF |
|
1 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Secure Network Storage System with Information Privacy.  |
WEWoRC  |
2005 |
DBLP BibTeX RDF |
|
Displaying result #1 - #37 of 37 (100 per page; Change: )
|
|