|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 27 occurrences of 25 keywords
|
|
|
Results
Found 37 publication records. Showing 37 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Frederik Armknecht, Stefan Lucks (eds.) |
Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![Springer, 978-3-642-34158-8 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Erik Tews, Julian Wälde, Michael Weiner |
Breaking DVB-CSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers, pp. 45-61, 2011, Springer, 978-3-642-34158-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marián Kühnel |
RSA Vulnerabilities with Small Prime Difference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers, pp. 122-136, 2011, Springer, 978-3-642-34158-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Onur Koçak, Nese Öztop |
Cryptanalysis of TWIS Block Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers, pp. 109-121, 2011, Springer, 978-3-642-34158-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michelle Kendall, Keith M. Martin |
On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers, pp. 62-82, 2011, Springer, 978-3-642-34158-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Robert Niebuhr, Pierre-Louis Cayrel |
Broadcast Attacks against Code-Based Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers, pp. 1-17, 2011, Springer, 978-3-642-34158-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xinxin Fan, Guang Gong |
On the Security of Hummingbird-2 against Side Channel Cube Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers, pp. 18-29, 2011, Springer, 978-3-642-34158-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Timo Bartkewitz, Tim Güneysu |
Full Lattice Basis Reduction on Graphics Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers, pp. 30-44, 2011, Springer, 978-3-642-34158-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Aysajan Abidin, Jan-Åke Larsson |
New Universal Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers, pp. 99-108, 2011, Springer, 978-3-642-34158-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zoya Dyka, Peter Langendörfer, Frank Vater |
Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2 k ). ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers, pp. 137-150, 2011, Springer, 978-3-642-34158-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ewan Fleischmann, Christian Forler, Stefan Lucks |
Γ-MAC[H, P] - A New Universal MAC Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers, pp. 83-98, 2011, Springer, 978-3-642-34158-8. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Lucks, Ahmad-Reza Sadeghi, Christopher Wolf (eds.) |
Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![Springer, 978-3-540-88352-4 The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Rei Yoshida, Rie Shigetomi, Kazuki Yoshizoe, Akira Otsuka, Hideki Imai |
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers, pp. 1-12, 2007, Springer, 978-3-540-88352-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Context-dependent Service, Randomized Response Technique, Privacy Protection |
1 | Michael Beiter |
Combiner Driven Management Models and Their Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers, pp. 114-126, 2007, Springer, 978-3-540-88352-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
multi-time secret sharing, threshold schemes with update capabilities, secret sharing, management models |
1 | Sebastiaan Indesteege, Bart Preneel |
Preimages for Reduced-Round Tiger. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers, pp. 90-99, 2007, Springer, 978-3-540-88352-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
hash functions, preimages, Tiger |
1 | Marko Hölbl, Christian Rechberger, Tatjana Welzer |
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers, pp. 28-38, 2007, Springer, 978-3-540-88352-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
differential collision search, hash function, conditions, SHA-256 |
1 | Tim Güneysu, Christof Paar, Sven Schäge |
Efficient Hash Collision Search Strategies on Special-Purpose Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers, pp. 39-51, 2007, Springer, 978-3-540-88352-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Crypto Attacks, Hash functions, Special-purpose Hardware |
1 | Rupert J. Hartung |
Cryptography Based on Quadratic Forms: Complexity Considerations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers, pp. 52-64, 2007, Springer, 978-3-540-88352-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | María Naya-Plasencia |
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers, pp. 142-152, 2007, Springer, 978-3-540-88352-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack |
1 | Anja Korsten |
Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers, pp. 78-89, 2007, Springer, 978-3-540-88352-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
MOR cryptosystem, inner automorphism problem, public key cryptography, discrete logarithm problem, non-abelian group |
1 | Gautham Sekar, Souradyuti Paul, Bart Preneel |
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers, pp. 127-141, 2007, Springer, 978-3-540-88352-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Léonard Dallot |
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers, pp. 65-77, 2007, Springer, 978-3-540-88352-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Waldyr D. Benits Junior, Steven D. Galbraith |
The GPS Identification Scheme Using Frobenius Expansions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers, pp. 13-27, 2007, Springer, 978-3-540-88352-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
GPS identificaion scheme, Elliptic Curves, Frobenius expansions |
1 | Nicolas T. Courtois, Blandine Debraize |
Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers, pp. 100-113, 2007, Springer, 978-3-540-88352-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
algebraic attacks on block ciphers, Gröbner bases, design of S-boxes, Rijndael, algebraic immunity, Serpent, multivariate equations |
1 | Adil Alsaid, Chris J. Mitchell |
A Scanning Tool for PC Root Public Key Stores. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium, pp. 45-52, 2005, GI, 3-88579-403-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Christopher Wolf, Stefan Lucks, Po-Wah Yau (eds.) |
WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![GI, 3-88579-403-9 The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Jaechul Sung, Jongsung Kim, Changhoon Lee, Seokhie Hong |
Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium, pp. 64-75, 2005, GI, 3-88579-403-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Frederik Armknecht |
Algebraic Attacks and Annihilators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium, pp. 13-21, 2005, GI, 3-88579-403-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Heiko Stamer |
Efficient Electronic Gambling: An Extended Implementation of the Toolbox for Mental Card Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium, pp. 1-12, 2005, GI, 3-88579-403-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Marie Virat |
A cryptosystem "à la" ElGamal on an elliptic curve over Fp [epsilon]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium, pp. 32-44, 2005, GI, 3-88579-403-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Alexandre Ruiz, Jorge Luis Villar |
Publicly Verfiable Secret Sharing from Paillier's Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium, pp. 98-108, 2005, GI, 3-88579-403-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Cédric Lauradoux |
Collision attacks on processors with cache and countermeasures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium, pp. 76-85, 2005, GI, 3-88579-403-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Stefan Lucks, Nico Schmoigl, Emin Islam Tatli |
Issues on Designing a Cryptographic Compiler. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium, pp. 109-122, 2005, GI, 3-88579-403-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Andrey Sidorenko, Berry Schoenmakers |
State Recovery Attacks on Pseudorandom Generators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium, pp. 53-63, 2005, GI, 3-88579-403-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Eabhnat Ní Fhloinn, Michael Purser |
Applications of Hiding in RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium, pp. 86-97, 2005, GI, 3-88579-403-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Analysis of simplified variants of SHA-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium, pp. 123-134, 2005, GI, 3-88579-403-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Secure Network Storage System with Information Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WEWoRC ![In: WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium, pp. 22-31, 2005, GI, 3-88579-403-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
Displaying result #1 - #37 of 37 (100 per page; Change: )
|
|