The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "FSE"( http://dblp.L3S.de/Venues/FSE )

URL (DBLP): http://dblp.uni-trier.de/db/conf/fse

Publication years (Num. hits)
1993 (26) 1994 (30) 1995-1996 (20) 1997 (25) 1998 (21) 1999 (23) 2000 (21) 2001 (29) 2002 (23) 2003 (28) 2004 (32) 2005 (30) 2006 (28) 2007 (29) 2008 (31) 2009 (25) 2010 (22) 2011 (24) 2012 (26) 2013 (30) 2014 (32) 2015 (30) 2016 (30)
Publication types (Num. hits)
inproceedings(592) proceedings(23)
Venues (Conferences, Journals, ...)
FSE(615)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 399 occurrences of 174 keywords

Results
Found 615 publication records. Showing 615 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Andrey Bogdanov, Florian Mendel, Francesco Regazzoni 0001, Vincent Rijmen, Elmar Tischhauser ALE: AES-Based Lightweight Authenticated Encryption. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Patrick Derbez, Pierre-Alain Fouque Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata Attacks and Security Proofs of EAX-Prime. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Ivica Nikolic Complementing Feistel Ciphers. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel 0001 A Framework for Automated Independent-Biclique Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gordon Procter, Carlos Cid On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny Rotational Cryptanalysis of Round-Reduced Keccak. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christina Boura, Anne Canteaut A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald Masking Tables - An Underestimated Security Risk. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Andrey Bogdanov, Elmar Tischhauser On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam On Symmetric Encryption with Distinguishable Decryption Failures. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Elena Andreeva 0001, Andrey Bogdanov, Bart Mennink Towards Understanding the Known-Key Security of Block Ciphers. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rishiraj Bhattacharyya, Arnab Roy 0005 Secure Message Authentication Against Related-Key Attack. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux Smashing WEP in a Passive Attack. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rodolphe Lampe, Yannick Seurin Tweakable Blockciphers with Asymptotically Optimal Security. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Takanori Isobe 0001, Toshihiro Ohigashi, Yuhei Watanabe, Masakatu Morii Full Plaintext Recovery Attack on Broadcast RC4. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ruilin Li, Heng Li, Chao Li 0002, Bing Sun 0001 A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang 0031, Shuang Wu Security Analysis of PRINCE. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Gaëtan Leurent Cryptanalysis of WIDEA. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay Towards Secure Distance Bounding. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bin Zhang 0003, Zhenqi Li, Dengguo Feng, Dongdai Lin Near Collision Attack on the Grain v1 Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hongbo Yu, Jiazhe Chen, Xiaoyun Wang 0001 Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256. Search on Bibsonomy FSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ji Li, Takanori Isobe 0001, Kyoji Shibutani Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Andrey Bogdanov, Meiqin Wang Zero Correlation Linear Cryptanalysis with Reduced Data Complexity. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Itai Dinur, Orr Dunkelman, Adi Shamir Improved Attacks on Full GOST. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Markku-Juhani Olavi Saarinen Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ewan Fleischmann, Christian Forler, Stefan Lucks McOE: A Family of Almost Foolproof On-Line Authenticated Encryption Schemes. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nicolas T. Courtois, Pouyan Sepehrdad, Petr Susil, Serge Vaudenay ElimLin Algorithm Revisited. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jiqiang Lu A Methodology for Differential-Linear Cryptanalysis and Its Applications - (Extended Abstract). Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mahdi Sajadieh, Mohammad Dakhilalian, Hamid Mala, Pouyan Sepehrdad Recursive Diffusion Layers for Block Ciphers and Hash Functions. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kaisa Nyberg "Provable" Security against Differential and Linear Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Phillip Rogaway, Mark Wooding, Haibin Zhang The Security of Ciphertext Stealing. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alexandre Duc, Jian Guo 0001, Thomas Peyrin, Lei Wei 0001 Unaligned Rebound Attack: Application to Keccak. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Stefan Heyse, Eike Kiltz, Vadim Lyubashevsky, Christof Paar, Krzysztof Pietrzak Lapin: An Efficient Authentication Protocol Based on Ring-LPN. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dmitry Khovratovich, Christian Rechberger, Alexandra Savelieva Bicliques for Preimages: Attacks on Skein-512 and the SHA-2 Family. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel UNAF: A Special Set of Additive Differences with Application to the Differential Analysis of ARX. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Joan Daemen, Gilles Van Assche Differential Propagation Analysis of Keccak. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Florian Mendel, Tomislav Nad, Martin Schläffer Collision Attacks on the Reduced Dual-Stream Hash Function RIPEMD-128. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Shuang Wu 0004, Dengguo Feng, Wenling Wu, Jian Guo 0001, Le Dong, Jian Zou (Pseudo) Preimage Attack on Round-Reduced Grøstl Hash Function and Others. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ya Liu 0001, Leibo Li, Dawu Gu, Xiaoyun Wang 0001, Zhiqiang Liu 0001, Jiazhe Chen, Wei Li 0013 New Observations on Impossible Differential Cryptanalysis of Reduced-Round Camellia. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Long Hoang Nguyen 0001, A. W. Roscoe 0001 Short-Output Universal Hash Functions and Their Use in Fast and Secure Data Authentication. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Anne Canteaut (eds.) Fast Software Encryption - 19th International Workshop, FSE 2012, Washington, DC, USA, March 19-21, 2012. Revised Selected Papers Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jérémy Jean, María Naya-Plasencia, Thomas Peyrin Improved Rebound Attack on the Finalist Grøstl. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Itai Dinur, Orr Dunkelman, Adi Shamir New Attacks on Keccak-224 and Keccak-256. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lei Wei 0001, Thomas Peyrin, Przemyslaw Sokolowski, San Ling, Josef Pieprzyk, Huaxiong Wang On the (In)Security of IDEA in Various Hashing Modes. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Meiqin Wang, Yue Sun, Elmar Tischhauser, Bart Preneel A Model for Structure Attacks, with Applications to PRESENT and Serpent. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1María Naya-Plasencia, Thomas Peyrin Practical Cryptanalysis of ARMADILLO2. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Claude Carlet, Louis Goubin, Emmanuel Prouff, Michaël Quisquater, Matthieu Rivain Higher-Order Masking Schemes for S-Boxes. Search on Bibsonomy FSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chunfang Zhou, Xiutao Feng, Chuankun Wu Linear Approximations of Addition Modulo 2n-1. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Antoine Joux (eds.) Fast Software Encryption - 18th International Workshop, FSE 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Mohamed Ahmed Abdelraheem, Gregor Leander, Erik Zenner Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Kan Yasuda Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Donghoon Chang, Mridul Nandi, Moti Yung On the Security of Hash Functions Employing Blockcipher Postprocessing. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Martin R. Albrecht, Pooya Farshim, Kenneth G. Paterson, Gaven J. Watson On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Ivica Nikolic, Arnab Roy 0005 Boomerang Attacks on BLAKE-32. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Simon Knellwolf, Willi Meier Cryptanalysis of the Knapsack Generator. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alex Biryukov, Ivica Nikolic Search for Related-Key Differential Characteristics in DES-Like Ciphers. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Subhamoy Maitra, Goutam Paul 0001, Sourav Sen Gupta 0001 Attack on Broadcast RC4 Revisited. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Vesselin Velichkov, Nicky Mouha, Christophe De Cannière, Bart Preneel The Additive Differential Probability of ARX. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Takanori Isobe 0001 A Single-Key Attack on the Full GOST Block Cipher. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Itai Dinur, Adi Shamir An Improved Algebraic Attack on Hamsi-256. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yu Sasaki Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marine Minier, María Naya-Plasencia, Thomas Peyrin Analysis of Reduced-SHAvite-3-256 v2. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Gaëtan Leurent, Søren S. Thomsen Practical Near-Collisions on the Compression Function of BMW. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Itai Dinur, Adi Shamir Breaking Grain-128 with Dynamic Cube Attacks. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Willi Meier Fast Correlation Attacks: Methods and Countermeasures. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Markku-Juhani O. Saarinen Cryptanalysis of Hummingbird-1. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Julia Borghoff, Lars R. Knudsen, Gregor Leander, Søren S. Thomsen Cryptanalysis of PRESENT-Like Ciphers with Secret S-Boxes. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Christina Boura, Anne Canteaut, Christophe De Cannière Higher-Order Differential Properties of Keccak and Luffa. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Céline Blondeau, Benoît Gérard Multiple Differential Cryptanalysis: Theory and Practice. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jérémy Jean, Pierre-Alain Fouque Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ted Krovetz, Phillip Rogaway The Software Performance of Authenticated-Encryption Modes. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Søren S. Thomsen Pseudo-cryptanalysis of the Original Blue Midnight Wish. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu 0001 Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1María Naya-Plasencia, Andrea Röck, Jean-Philippe Aumasson, Yann Laigle-Chapuy, Gaëtan Leurent, Willi Meier, Thomas Peyrin Cryptanalysis of ESSENCE. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jean-Philippe Aumasson, Jian Guo 0001, Simon Knellwolf, Krystian Matusiewicz, Willi Meier Differential and Invertibility Properties of BLAKE. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi Security Analysis of the Mode of JH Hash Function. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mridul Nandi A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dai Watanabe, Yasuo Hatano, Tsuyoshi Yamada, Toshinobu Kaneko Higher Order Differential Attack on Step-Reduced Variants of Luffa v1. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Olivier Billet, Jonathan Etrog, Henri Gilbert Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ilya Mironov Domain Extension for Enhanced Target Collision-Resistant Hash Functions. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dag Arne Osvik, Joppe W. Bos, Deian Stefan, David Canright Fast Software AES Encryption. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Henri Gilbert, Thomas Peyrin Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kazuhiko Minematsu How to Thwart Birthday Attacks against MACs via Small Randomness. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sondre Rønjom, Carlos Cid Nonlinear Equivalence of Stream Ciphers. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Tomoyasu Suzaki, Kazuhiko Minematsu Improving the Generalized Feistel. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Karsten Nohl, Erik Tews, Ralf-Philipp Weinmann Cryptanalysis of the DECT Standard Cipher. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dmitry Khovratovich, Ivica Nikolic Rotational Cryptanalysis of ARX. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lei Wang 0031, Yu Sasaki Finding Preimages of Tiger Up to 23 Steps. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Charles Bouillaguet, Orr Dunkelman, Gaëtan Leurent, Pierre-Alain Fouque Another Look at Complementation Properties. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vincent Rijmen, Deniz Toz, Kerem Varici Rebound Attack on Reduced-Round Versions of JH. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Seokhie Hong, Tetsu Iwata (eds.) Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Onur Özen, Thomas Shrimpton, Martijn Stam Attacking the Knudsen-Preneel Compression Functions. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Liting Zhang, Wenling Wu, Peng Wang 0009, Lei Zhang 0012, Shuang Wu 0004, Bo Liang Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: PGV Model Revisited. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Martin R. Albrecht, Carlos Cid Algebraic Techniques in Differential Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ewan Fleischmann, Michael Gorski, Stefan Lucks On the Security of Tandem-DM. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF block cipher based, double-block length, Tandem-DM, Cryptographic hash function, ideal cipher model, proof of security
1Mridul Nandi Fast and Secure CBC-Type MAC Algorithms. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF OMAC, padding rule, prf-security, CBC-MAC
1Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu 0001 Enhanced Target Collision Resistant Hash Functions Revisited. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF TCR, eTCR, Hash Functions, CR, Domain Extension
1Paul Stankovski, Martin Hell, Thomas Johansson 0001 An Efficient State Recovery Attack on X-FCSR-256. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF X-FCSR, state recovery, cryptanalysis, stream cipher, FCSR
1Kazuhiko Minematsu Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Cipher Mode, Birthday Bound, Tweakable Block Cipher
Displaying result #101 - #200 of 615 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license