The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase block-ciphers (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1992 (17) 1993-1996 (20) 1997-1998 (36) 1999-2000 (40) 2001 (25) 2002 (25) 2003 (36) 2004 (47) 2005 (38) 2006 (52) 2007 (47) 2008 (57) 2009 (50) 2010 (25) 2011 (18) 2012 (41) 2013 (40) 2014 (38) 2015 (47) 2016 (37) 2017 (54) 2018 (47) 2019 (42) 2020 (62) 2021 (34) 2022 (42) 2023 (46) 2024 (7)
Publication types (Num. hits)
article(442) book(1) incollection(13) inproceedings(578) phdthesis(36)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 634 occurrences of 233 keywords

Results
Found 1070 publication records. Showing 1070 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
37Ryota Nakamichi, Tetsu Iwata Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
37Alya Geogiana Buja, Shekh Faisal Abdul-Latip, Rabiah Ahmad Fault Analysis of the KTANTAN Family of Block Ciphers: A Revisited Work of Fault Analysis of the KATAN Family of Block Ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
37Ashwin Jha, Eik List, Kazuhiko Minematsu, Sweta Mishra, Mridul Nandi XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
37Ashwin Jha, Eik List, Kazuhiko Minematsu, Sweta Mishra, Mridul Nandi XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing. Search on Bibsonomy LATINCRYPT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
36Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee 0002 Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CIKS-128, CIKS-128H, Related-Key Differential Attack, Block Cipher, Data-Dependent Operation
36Devesh C. Jinwala, Dhiren R. Patel, Kankar S. Dasgupta Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Authentication, Encryption, Block Ciphers, Link Layer Security
36Yevgeniy Dodis, Aleksandr Yampolskiy, Moti Yung Threshold and Proactive Pseudo-Random Permutations. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Distributed Block Ciphers, Distributed Luby-Rackoff Construction, Oblivious Pseudo-Random Functions, Threshold Cryptography
36Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw Combining Compression Functions and Block Cipher-Based Hash Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF block ciphers, hash functions, compression functions
36Valery Pryamikov Enciphering with Arbitrary Small Finite Domains. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Block Ciphers, Modes of Operations, Symmetric Encryption, Pseudorandom Permutations
36Thomas Baignères, Pascal Junod, Serge Vaudenay How Far Can We Go Beyond Linear Cryptanalysis? Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF statistical cryptanalysis, Block ciphers, linear cryptanalysis
36Håvard Raddum Cryptanalysis of IDEA-X/2. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cryptography, block ciphers, differential cryptanalysis, IDEA
36Alex Biryukov, Eyal Kushilevitz Improved Cryptanalysis of RC5. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF RGS, Block ciphers, differential cryptanalysis
36Alex Biryukov, Eyal Kushilevitz From Differential Cryptanalysis to Ciphertext-Only Attacks. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Madryga, RC5, ciphertext-only attack, differential-linear attack, block-ciphers, DES, differential cryptanalysis
36Adi Shamir Stream Ciphers: Dead or Alive? Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Willi Meier, Enes Pasalic, Claude Carlet Algebraic Attacks and Decomposition of Boolean Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Jonathan J. Hoch, Adi Shamir Fault Analysis of Stream Ciphers. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Lili-128, SOBER-t32, Stream cipher, LFSR, fault attack, RC4
35Shiho Moriai, Serge Vaudenay On the Pseudorandomness of Top-Level Schemes of Block Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
35Amr M. Youssef, Guang Gong On the Interpolation Attacks on Block Ciphers. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF interpolation attack, Galois Field Fourier Transform, cryptanalysis, Block cipher, finite fields
35Lars R. Knudsen, Bart Preneel Hash Functions Based on Block Ciphers and Quaternary Codes. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
33Baudoin Collard, François-Xavier Standaert A Statistical Saturation Attack against the Block Cipher PRESENT. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
33Eric Whitman Smith, David L. Dill Automatic Formal Verification of Block Cipher Implementations. Search on Bibsonomy FMCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Debra L. Cook, Moti Yung, Angelos D. Keromytis Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF (strong) pseudorandom permutations, variable-length PRPs, block ciphers
33Goce Jakimoski Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multicast stream authentication, cryptanalysis, block ciphers, message authentication, related-key attacks, TESLA
33Jacques Patarin, Valérie Nachef, Côme Berbain Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unbalanced Feistel permutations, generic attacks, Luby-Rackoff theory, block ciphers, pseudo-random permutations
33Johannes Buchmann 0001, Andrei Pyshkin, Ralf-Philipp Weinmann A Zero-Dimensional Gröbner Basis for AES-128. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Gröbner bases, block ciphers, AES, Rijndael
33Pascal Junod New Attacks Against Reduced-Round Versions of IDEA. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Demirci-Biryukov relation, Block ciphers, IDEA
33Olivier Billet, Henri Gilbert, Charaf Ech-Chatbi Cryptanalysis of a White Box AES Implementation. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF white box, implementation, block ciphers, AES, tamper resistance, software piracy
33Gilles Piret, Jean-Jacques Quisquater A Differential Fault Attack Technique against SPN Structures, with Application to the AES and KHAZAD. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Block Ciphers, AES, Side-channel Attacks, Fault Attacks
33Raphael Chung-Wei Phan, Soichi Furuya Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF extended slide attacks, sliding property, cryptanalysis, Block ciphers, DES, key schedule
33Matt Blaze, Joan Feigenbaum, Moni Naor A Formal Treatment of Remotely Keyed Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Remotely Keyed Encryption, Smart-cards, Block Ciphers, Pseudorandomness, Session Keys
33Charanjit S. Jutla Generalized Birthday Arracks on Unbalanced Feistel Networks. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF second moment method, Block ciphers, birthday attacks, pseudo-random permutations, Feistel networks
33David A. Wagner 0001, Bruce Schneier, John Kelsey Cryptanalysis of the Cellular Encryption Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF cellular telephone, Cryptanalysis, block ciphers
32Bing Sun 0001, Longjiang Qu, Chao Li 0002 New Cryptanalysis of Block Ciphers with Low Algebraic Degree. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF interpolation attack, integral attack, block cipher, Feistel cipher
32Thomas Jakobson Cryptanalysis of Block Ciphers with Probabilistic Non-linear Relations of Low Degree. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF interpolation attack, non-linear relations, Sudan's algorithm, Cryptanalysis, block cipher, Reed-Solomon codes
31Kazuhiko Minematsu Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Cipher Mode, Birthday Bound, Tweakable Block Cipher
31Ashwin Jha, Mridul Nandi On rate-1 and beyond-the-birthday bound secure online ciphers using tweakable block ciphers. Search on Bibsonomy Cryptogr. Commun. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Etienne Tehrani, Jean-Luc Danger, Tarik Graba Generic Architecture for Lightweight Block Ciphers: A First Step Towards Agile Implementation of Multiple Ciphers. Search on Bibsonomy WISTP The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
31Sandy Harris Exploring Cipherspace: Combining stream ciphers and block ciphers. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
31Alex Biryukov Block Ciphers and Stream Ciphers: The State of the Art. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
31Deukjo Hong, Daesung Kwon Cryptanalysis of Some Double-Block-Length Hash Modes of Block Ciphers with n-Bit Block and n-Bit Key. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
30Nicolas Fournel, Marine Minier, Stéphane Ubéda Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF benchmarks, sensors, stream ciphers
30Mitsuru Matsui, Junko Nakajima On the Power of Bitslice Implementation on Intel Core2 Processor. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fast Software Encryption, Bitslice, KASUMI, Core2, AES
30Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng, Qin-Zhong Ye Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
29Zheng Yuan, Wei Wang 0035, Keting Jia, Guangwu Xu, Xiaoyun Wang 0001 New Birthday Attacks on Some MACs Based on Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF MAC, AES, Distinguishing attack, Impossible differential cryptanalysis, Forgery attack, Birthday attack
29Matthieu Rivain, Emmanuel Prouff, Julien Doget Higher-Order Masking and Shuffling for Software Implementations of Block Ciphers. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Praveen R. Samala, Hamid Vakilzadian, Dietmar P. F. Möller Modeling and simulation of common primitive operations used in block ciphers. Search on Bibsonomy SCSC The full citation details ... 2007 DBLP  BibTeX  RDF discrete event simulation, hardware modeling, encryption algorithms
29Deukjo Hong, Seokhie Hong, Wonil Lee, Sangjin Lee 0002, Jongin Lim 0001, Jaechul Sung, Okyeon Yi Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Carlisle M. Adams Designing against a class of algebraic attacks on symmetric block ciphers. Search on Bibsonomy Appl. Algebra Eng. Commun. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF symmetric block cipher design, substitution box round function, algebraic cryptanalysis
29Myeong-Hyeon Lee, Yoon-Hwa Choi An Easily Testable and Reconfigurable Pipeline for Symmetric Block Ciphers. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Elisabeth Oswald, Stefan Mangard, Christoph Herbst, Stefan Tillich Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29François-Xavier Standaert, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat A methodology to implement block ciphers in reconfigurable hardware and its application to fast and compact AES RIJNDAEL. Search on Bibsonomy FPGA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF AES RIJNDAEL, high encryption rates, FPGA, cryptography, reconfigurable hardware
29Ramesh Karri, Grigori Kuznetsov, Michael Gössel Parity-Based Concurrent Error Detection in Symmetric Block Ciphers. Search on Bibsonomy ITC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Min-Kyu Joo, Jin-Hyung Kim, Yoon-Hwa Choi A Fault-Tolerant Architecture for Symmetric Block Ciphers. Search on Bibsonomy Asian Test Symposium The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Dawu Gu, Wang Yi 0001 On the Techniques of Enhancing the Security of Block Ciphers. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Anne Canteaut Cryptographic Functions and Design Criteria for Block Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Shoichi Hirose Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF block cipher, black-box model, double-block-length hash function
28Yang Xiao 0001, Hsiao-Hwa Chen, Xiaojiang Du, Mohsen Guizani Stream-based cipher feedback mode in wireless error channel. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Vincent Rijmen, Bart Preneel A Family of Trapdoor Ciphers. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
27Jooyoung Lee, Yongjin Yeom Efficient RFID authentication protocols based on pseudorandom sequence generators. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A60
27Matthew Robshaw The eSTREAM Project. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Shai Halevi, Hugo Krawczyk Security under key-dependent inputs. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF circular encryption, key-dependent input, self encryption
27Frédéric Didier, Jean-Pierre Tillich Computing the Algebraic Immunity Efficiently. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Low degree multiple, Boolean functions, Stream ciphers, Algebraic attacks, Algebraic immunity, Annihilator
27Raphael Chung-Wei Phan Advanced Slide Attacks Revisited: Realigning Slide on DES. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Taizo Shirai, Kyoji Shibutani Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF active S-boxes, multiple MDS design, MDS, Feistel cipher
27Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IDEA and MESH ciphers, known-plaintext attack, Cryptanalysis
27Nikhil Joshi, Kaijie Wu 0001, Ramesh Karri Concurrent Error Detection Schemes for Involution Ciphers. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Involutional ciphers, KHAZAD, Fault Tolerance, Concurrent Error Detection (CED)
27Ali Aydin Selçuk On Bias Estimation in Linear Cryptanalysis. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27Zulfikar Ramzan, Leonid Reyzin On the Round Security of Symmetric-Key Cryptographic Primitives. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
27Alex Biryukov, David A. Wagner 0001 Slide Attacks. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
26Liting Zhang, Wenling Wu, Lei Zhang 0012, Yanjun Li A note on Cook's elastic block cipher. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF elastic block cipher, variable-input-length block cipher, encryption, block cipher, security model, pseudorandomness
25Pascal Junod, Marco Macchetti Revisiting the IDEA Philosophy. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IDEA block cipher, WIDEA compression function, Intel Core2 CPU, wordslice implementation
25Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, C. Vikkelsoe PRESENT: An Ultra-Lightweight Block Cipher. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Marco Macchetti, Wenyu Chen ASIC hardware implementation of the IDEA NXT encryption algorithm. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram Towards Making Luby-Rackoff Ciphers Optimal and Practical. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
25Serge Vaudenay Feistel Ciphers with L2-Decorrelation. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
25Stefan Lucks On the Security of Remotely Keyed Encryption. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
25Burton S. Kaliski Jr., Matthew J. B. Robshaw Linear Cryptanalysis Using Multiple Approximations. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
24Ruoxin Zhao, Rui Zhang 0002, Yongqiang Li 0001, Baofeng Wu Construction of MDS block diffusion matrices for block ciphers and hash functions. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Rei Ueno, Naofumi Homma, Takafumi Aoki Efficient DFA on SPN-Based Block Ciphers and Its Application to the LED Block Cipher. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
24Ruoxin Zhao, Rui Zhang 0002, Yongqiang Li 0001, Baofeng Wu On Constructions of a Sort of MDS Block Diffusion Matrices for Block Ciphers and Hash Functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
24Bora Aslan Blok şifreler için cebirsel ikili doğrusal dönüşüm tasarımı ve modern bir blok şifreye uygulanması (Algebraic construction of binary linear transformations for block ciphers and implementation of a constructed binary linear transformation in a modern block cipher) Search on Bibsonomy 2013   RDF
23Xu Guo 0001, Zhimin Chen 0002, Patrick Schaumont Energy and Performance Evaluation of an FPGA-Based SoC Platform with AES and PRESENT Coprocessors. Search on Bibsonomy SAMOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee 0002 Impossible Differential Cryptanalysis for Block Cipher Structures. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Éliane Jaulmes, Antoine Joux, Frédéric Valette On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Joan Daemen, Mario Lamberger, Norbert Pramstaller, Vincent Rijmen, Frederik Vercauteren Computational aspects of the expected differential probability of 4-round AES and AES-like ciphers. Search on Bibsonomy Computing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A60, 11T71
22Jean-Philippe Aumasson, Orr Dunkelman, Sebastiaan Indesteege, Bart Preneel Cryptanalysis of Dynamic SHA(2). Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Dynamic SHA, Dynamic SHA2, hash function, collision attack, SHA-3 candidate
22Martin R. Albrecht, Carlos Cid Algebraic Techniques in Differential Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Matthieu Rivain Differential Fault Analysis on DES Middle Rounds. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Deepak Kumar Dalai On 3-to-1 and Power APN S-Boxes. Search on Bibsonomy SETA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF APN Function, Differential Cryptanalysis, S-box, Power Function
22Adam J. Elbirt Fast and Efficient Implementation of AES via Instruction Set Extensions. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptography, block cipher, AES, Galois Field
22Adam J. Elbirt, Christof Paar Efficient Implementation of Galois Field Fixed Field Constant Multiplication. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF embedded systems, cryptography, block cipher, galois field
22Ueli M. Maurer, Yvonne Anne Oswald, Krzysztof Pietrzak, Johan Sjödin Luby-Rackoff Ciphers from Weak Round Functions? Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Changhoon Lee, Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee 0002 Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b. Search on Bibsonomy Mycrypt The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cobra-S128, Cobra-F64, Block Cipher, Related-Key Attack, Data-Dependent Permutation
22Joseph Zambreno, David Nguyen, Alok N. Choudhary Exploring Area/Delay Tradeoffs in an AES FPGA Implementation. Search on Bibsonomy FPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Yevgeniy Dodis, Rosario Gennaro, Johan Håstad, Hugo Krawczyk, Tal Rabin Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Hervé Ledig, Frédéric Muller, Frédéric Valette Enhancing Collision Attacks. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Claude Carlet, Emmanuel Prouff Vectorial Functions and Covering Sequences. Search on Bibsonomy International Conference on Finite Fields and Applications The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Antoine Joux, Guillaume Poupard, Jacques Stern New Attacks against Standardized MACs. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Hongjun Wu Related-Cipher Attacks. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Eric Filiol, Caroline Fontaine A New Ultrafast Stream Cipher Design: COS Ciphers. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF vectorized cipher, high speed encryption, Boolean functions, stream cipher, block cipher, nonlinear feedback shift register
Displaying result #101 - #200 of 1070 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license