The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "WEWoRC"( http://dblp.L3S.de/Venues/WEWoRC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/weworc

Publication years (Num. hits)
2005 (13) 2007 (12) 2008 (1) 2011 (10) 2012 (1)
Publication types (Num. hits)
inproceedings(34) proceedings(3)
Venues (Conferences, Journals, ...)
WEWoRC(37)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 27 occurrences of 25 keywords

Results
Found 37 publication records. Showing 37 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Frederik Armknecht, Stefan Lucks (eds.) Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers Search on Bibsonomy WEWoRC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Erik Tews, Julian Wälde, Michael Weiner Breaking DVB-CSA. Search on Bibsonomy WEWoRC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marián Kühnel RSA Vulnerabilities with Small Prime Difference. Search on Bibsonomy WEWoRC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Onur Koçak, Nese Öztop Cryptanalysis of TWIS Block Cipher. Search on Bibsonomy WEWoRC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michelle Kendall, Keith M. Martin On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks. Search on Bibsonomy WEWoRC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Robert Niebuhr, Pierre-Louis Cayrel Broadcast Attacks against Code-Based Schemes. Search on Bibsonomy WEWoRC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xinxin Fan, Guang Gong On the Security of Hummingbird-2 against Side Channel Cube Attacks. Search on Bibsonomy WEWoRC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Timo Bartkewitz, Tim Güneysu Full Lattice Basis Reduction on Graphics Cards. Search on Bibsonomy WEWoRC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Aysajan Abidin, Jan-Åke Larsson New Universal Hash Functions. Search on Bibsonomy WEWoRC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zoya Dyka, Peter Langendörfer, Frank Vater Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2 k ). Search on Bibsonomy WEWoRC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ewan Fleischmann, Christian Forler, Stefan Lucks Γ-MAC[H, P] - A New Universal MAC Scheme. Search on Bibsonomy WEWoRC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stefan Lucks, Ahmad-Reza Sadeghi, Christopher Wolf (eds.) Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers Search on Bibsonomy WEWoRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Rei Yoshida, Rie Shigetomi, Kazuki Yoshizoe, Akira Otsuka, Hideki Imai A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Context-dependent Service, Randomized Response Technique, Privacy Protection
1Michael Beiter Combiner Driven Management Models and Their Applications. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-time secret sharing, threshold schemes with update capabilities, secret sharing, management models
1Sebastiaan Indesteege, Bart Preneel Preimages for Reduced-Round Tiger. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash functions, preimages, Tiger
1Marko Hölbl, Christian Rechberger, Tatjana Welzer Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF differential collision search, hash function, conditions, SHA-256
1Tim Güneysu, Christof Paar, Sven Schäge Efficient Hash Collision Search Strategies on Special-Purpose Hardware. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Crypto Attacks, Hash functions, Special-purpose Hardware
1Rupert J. Hartung Cryptography Based on Quadratic Forms: Complexity Considerations. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1María Naya-Plasencia Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack
1Anja Korsten Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MOR cryptosystem, inner automorphism problem, public key cryptography, discrete logarithm problem, non-abelian group
1Gautham Sekar, Souradyuti Paul, Bart Preneel New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Léonard Dallot Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Waldyr D. Benits Junior, Steven D. Galbraith The GPS Identification Scheme Using Frobenius Expansions. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF GPS identificaion scheme, Elliptic Curves, Frobenius expansions
1Nicolas T. Courtois, Blandine Debraize Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF algebraic attacks on block ciphers, Gröbner bases, design of S-boxes, Rijndael, algebraic immunity, Serpent, multivariate equations
1Adil Alsaid, Chris J. Mitchell A Scanning Tool for PC Root Public Key Stores. Search on Bibsonomy WEWoRC The full citation details ... 2005 DBLP  BibTeX  RDF
1Christopher Wolf, Stefan Lucks, Po-Wah Yau (eds.) WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium Search on Bibsonomy WEWoRC The full citation details ... 2005 DBLP  BibTeX  RDF
1Jaechul Sung, Jongsung Kim, Changhoon Lee, Seokhie Hong Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds. Search on Bibsonomy WEWoRC The full citation details ... 2005 DBLP  BibTeX  RDF
1Frederik Armknecht Algebraic Attacks and Annihilators. Search on Bibsonomy WEWoRC The full citation details ... 2005 DBLP  BibTeX  RDF
1Heiko Stamer Efficient Electronic Gambling: An Extended Implementation of the Toolbox for Mental Card Games. Search on Bibsonomy WEWoRC The full citation details ... 2005 DBLP  BibTeX  RDF
1Marie Virat A cryptosystem "à la" ElGamal on an elliptic curve over Fp [epsilon]. Search on Bibsonomy WEWoRC The full citation details ... 2005 DBLP  BibTeX  RDF
1Alexandre Ruiz, Jorge Luis Villar Publicly Verfiable Secret Sharing from Paillier's Cryptosystem. Search on Bibsonomy WEWoRC The full citation details ... 2005 DBLP  BibTeX  RDF
1Cédric Lauradoux Collision attacks on processors with cache and countermeasures. Search on Bibsonomy WEWoRC The full citation details ... 2005 DBLP  BibTeX  RDF
1Stefan Lucks, Nico Schmoigl, Emin Islam Tatli Issues on Designing a Cryptographic Compiler. Search on Bibsonomy WEWoRC The full citation details ... 2005 DBLP  BibTeX  RDF
1Andrey Sidorenko, Berry Schoenmakers State Recovery Attacks on Pseudorandom Generators. Search on Bibsonomy WEWoRC The full citation details ... 2005 DBLP  BibTeX  RDF
1Eabhnat Ní Fhloinn, Michael Purser Applications of Hiding in RSA. Search on Bibsonomy WEWoRC The full citation details ... 2005 DBLP  BibTeX  RDF
1Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Analysis of simplified variants of SHA-256. Search on Bibsonomy WEWoRC The full citation details ... 2005 DBLP  BibTeX  RDF
1SeongHan Shin, Kazukuni Kobara, Hideki Imai A Secure Network Storage System with Information Privacy. Search on Bibsonomy WEWoRC The full citation details ... 2005 DBLP  BibTeX  RDF
Displaying result #1 - #37 of 37 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license