|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 399 occurrences of 174 keywords
|
|
|
Results
Found 615 publication records. Showing 615 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Bing Sun 0001, Longjiang Qu, Chao Li 0002 |
New Cryptanalysis of Block Ciphers with Low Algebraic Degree. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
interpolation attack, integral attack, block cipher, Feistel cipher |
1 | Alex Biryukov, Praveen Gauravaram, Jian Guo 0001, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang |
Cryptanalysis of the LAKE Hash Family. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Martijn Stam |
Blockcipher-Based Hashing Revisited. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Tetsu Iwata, Kan Yasuda |
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
SIV, Universal hash function, security proof, counter mode |
1 | Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp Weinmann |
Meet-in-the-Middle Attacks on SHA-3 Candidates. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen |
The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
Grøstl, Maelstrom, hash function, collision attack, Whirlpool, near-collision |
1 | Sebastiaan Indesteege, Bart Preneel |
Practical Collisions for EnRUPT. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
EnRUPT, hash function, collision attack, SHA-3 candidate |
1 | Mitsuru Matsui |
Key Collisions of the RC4 Stream Cipher. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Fuhr 0001, Thomas Peyrin |
Cryptanalysis of RadioGatún. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
RadioGatún, cryptanalysis, hash functions |
1 | John Black, Martin Cochran |
MAC Reforgeability. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
Provable Security, Message Authentication Codes, Birthday Attacks |
1 | Takanori Isobe 0001, Kyoji Shibutani |
Preimage Attacks on Reduced Tiger and SHA-2. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger |
1 | Orr Dunkelman (eds.) |
Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers |
FSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyun Wang 0001, Wei Wang 0035, Keting Jia, Meiqin Wang |
New Distinguishing Attack on MAC Using Secret-Prefix Method. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
secret prefix method, MAC, distinguishing attack, SHA-1 |
1 | Yevgeniy Dodis, Leonid Reyzin, Ronald L. Rivest, Emily Shen |
Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir |
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Shay Gueron |
Intel's New AES Instructions for Enhanced Performance and Security. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
new instructions set, computer architecture, Advanced Encryption Standard |
1 | Pascal Junod, Marco Macchetti |
Revisiting the IDEA Philosophy. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
IDEA block cipher, WIDEA compression function, Intel Core2 CPU, wordslice implementation |
1 | Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan Sepehrdad |
Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2). |
FSE |
2009 |
DBLP DOI BibTeX RDF |
ISDB, ARIB, MULTI2, block cipher, linear cryptanalysis, conditional access |
1 | Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg |
Multidimensional Extension of Matsui's Algorithm 2. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Michal Hojsík, Bohuslav Rudolf |
Differential Fault Analysis of Trivium. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
Trivium stream cipher, fault injection, differential fault analysis |
1 | Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong |
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
HMAC, Key recovery attack, Second preimage attack, NMAC, HAVAL |
1 | Ivica Nikolic, Alex Biryukov |
Collisions for Step-Reduced SHA-256. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Blandine Debraize, Louis Goubin |
Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
guess-and-determine attacks, stream cipher, SAT solver, algebraic cryptanalysis, self-shrinking generator, multivariate quadratic equations |
1 | Eli Biham, Orr Dunkelman, Nathan Keller |
A Unified Approach to Related-Key Attacks. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Donghoon Chang, Mridul Nandi |
Improved Indifferentiability Security Analysis of chopMD Hash Function. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Philippe Aumasson, Simon Fischer 0002, Shahram Khazaei, Willi Meier, Christian Rechberger |
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan |
The Hash Function Family LAKE. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
HAIFA, Randomized hashing, Salt, Wide-pipe, Hash function |
1 | Kan Yasuda |
A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
birthday barrier, tweak, quasi-random function, message authentication code, mode of operation, checksum, pseudo-random function, compression function, domain extension |
1 | Debrup Chakraborty, Mridul Nandi |
An Improved Security Bound for HCTR. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jean-Jacques Quisquater |
On the Salsa20 Core Function. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
Salsa20, cryptanalysis, hash function, collision |
1 | Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater |
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo |
Impossible Differential Cryptanalysis of CLEFIA. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
diffusion switching mechanism, generalized Feistel structure, block cipher, impossible differential cryptanalysis, CLEFIA |
1 | Adi Shamir |
SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
SQUASH, RFID, MAC, Hash function, provable security |
1 | Eli Biham, Yaniv Carmeli |
Efficient Reconstruction of RC4 Keys from Internal States. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
Initial Permutation, Cryptanalysis, Stream Cipher, RC4, Key Scheduling |
1 | Kaisa Nyberg (eds.) |
Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee |
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Hüseyin Demirci, Ali Aydin Selçuk |
A Meet-in-the-Middle Attack on 8-Round AES. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
meet-in-the-middle cryptanalysis, square attack, AES, Rijndael |
1 | Vadim Lyubashevsky, Daniele Micciancio, Chris Peikert, Alon Rosen |
SWIFFT: A Modest Proposal for FFT Hashing. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Subhamoy Maitra, Goutam Paul 0001 |
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
Key Leakage, Cryptanalysis, Stream Cipher, Bias, RC4, Keystream |
1 | Nicolas T. Courtois, Gregory V. Bard, David A. Wagner 0001 |
Algebraic and Slide Attacks on KeeLoq. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
unbalanced Feistel ciphers, Gröbner bases, KeeLoq, block ciphers, SAT solvers, algebraic cryptanalysis, slide attacks |
1 | Florian Mendel, Norbert Pramstaller, Christian Rechberger |
A (Second) Preimage Attack on the GOST Hash Function. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, preimage attack |
1 | Stéphane Manuel, Thomas Peyrin |
Collisions on SHA-0 in One Hour. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
hash functions, SHA-0, boomerang attack |
1 | Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff |
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Patrick Lacharme |
Post-Processing Functions for a Biased Physical Random Number Generator. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
linear correcting codes, entropy, Fourier transform, bias, resilient functions |
1 | Seny Kamara, Jonathan Katz |
How to Encrypt with a Malicious Random Number Generator. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
Private-key encryption, random number generation |
1 | Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo 0001, San Ling, Huaxiong Wang |
Cryptanalysis of LASH. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson |
Bit-Pattern Based Integral Attack. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
integral cryptanalysis, Noekeon, Block ciphers, present, Serpent |
1 | Eli Biham |
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Röck |
Entropy of the Internal State of an FCSR in Galois Representation. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Gaëtan Leurent |
MD4 is Not One-Way. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash function, preimage, MD4, one-way |
1 | Markus Dichtl |
Bad and Good Ways of Post-processing Biased Physical Random Numbers. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
quasigroup, physical random numbers, bias, post-processing |
1 | Simon Fischer 0002, Willi Meier |
Algebraic Immunity of S-Boxes and Augmented Functions. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Augmented Function, Stream Cipher, Algebraic Attack, S-box, Trivium, Filter Generator |
1 | Orhun Kara, Cevat Manap |
A New Class of Weak Keys for Blowfish. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Blowfish, key dependent S-Box, self similarity analysis, cryptanalysis, fixed point, weak key, reflection attack |
1 | Chu-Wee Lim, Khoongming Khoo |
An Analysis of XSL Applied to BES. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
XSL algorithm, AES, linearisation, BES |
1 | Eli Biham, Orr Dunkelman, Nathan Keller |
Improved Slide Attacks. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Hongjun Wu 0001, Bart Preneel |
Differential-Linear Attacks Against the Stream Cipher Phelix. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Côme Berbain, Henri Gilbert |
On the Security of IV Dependent Stream Ciphers. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
IV setup, stream cipher, provable security, PRNG |
1 | Jongsung Kim, Seokhie Hong, Bart Preneel |
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Ciphers, AES, Related-Key Rectangle Attack |
1 | Alex Biryukov (eds.) |
Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers |
FSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Gregor Leander, Christof Paar, Axel Poschmann, Kai Schramm |
New Lightweight DES Variants. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
DESL, S-box design criteria, RFID, DES, lightweight cryptography |
1 | Kazuhiko Minematsu, Toshiyasu Matsushima |
New Bounds for PMAC, TMAC, and XCBC. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk |
Cryptanalysis of FORK-256. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
FORK-256, micro-collisions, cryptanalysis, hash functions |
1 | Joan Daemen, Gilles Van Assche |
Producing Collisions for Panama, Instantaneously. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
hash function, collision, symmetric cryptography |
1 | Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai |
Algebraic Cryptanalysis of 58-Round SHA-1. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Gröbner basis, SHA-1, differential attack |
1 | Louis Granboulan, Thomas Pornin |
Perfect Block Ciphers with Small Blocks. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe |
Generalized Correlation Analysis of Vectorial Boolean Functions. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Vectorial Boolean Functions, Unrestricted Nonlinearity, Resiliency |
1 | Thomas Ristenpart, Phillip Rogaway |
How to Enrich the Message Space of a Cipher. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Deterministic encryption, enciphering scheme, length-preserving encryption, multipermutation, symmetric encryption |
1 | Bo-Yin Yang, Chia-Hsin Owen Chen, Daniel J. Bernstein, Jiun-Ming Chen |
Analysis of QUAD |
FSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen |
The Grindahl Hash Functions. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
hash functions, AES, Rijndael, proposal, design strategy |
1 | Eli Biham, Orr Dunkelman, Nathan Keller |
A New Attack on 6-Round IDEA. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Håkan Englund, Martin Hell, Thomas Johansson 0001 |
Two General Attacks on Pomaranch-Like Keystream Generators. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
resynchronization attack, Stream ciphers, distinguishing attack, eSTREAM, Pomaranch |
1 | Gaëtan Leurent |
Message Freedom in MD4 and MD5 Collisions: Application to APOP. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
message modification, meaningful collisions, APOP security, Hash function, MD5, MD4 |
1 | María Naya-Plasencia |
Cryptanalysis of Achterbahn-128/80. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack |
1 | Yannick Seurin, Thomas Peyrin |
Security Analysis of Constructions Combining FIL Random Oracles. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
block ciphers, hash functions, provable security, random oracle, compression functions |
1 | Antoine Joux, Jean-René Reinhard |
Overtaking VEST. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
inner collision, chosen IV attack, Stream cipher |
1 | Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro |
New Message Difference for MD4. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Message Difference, Hash Function, Collision Attack, MD4, Local Collision, Differential Path |
1 | Kris Tiri, Onur Aciiçmez, Michael Neve, Flemming Andersen |
An Analytical Model for Time-Driven Cache Attacks. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata |
The 128-Bit Blockcipher CLEFIA (Extended Abstract). |
FSE |
2007 |
DBLP DOI BibTeX RDF |
generalized Feistel structure, DSM, blockcipher, CLEFIA |
1 | Yevgeniy Dodis, Krzysztof Pietrzak |
Improving the Security of MACs Via Randomized Message Preprocessing. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Yassir Nawaz, Guang Gong, Kishan Chand Gupta |
Upper Bounds on Algebraic Immunity of Boolean Power Functions. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Inverse exponent, Kasami exponent, Niho exponent, Algebraic attacks, Algebraic immunity, Power functions, Polynomial functions |
1 | Hongbo Yu, Xiaoyun Wang 0001, Aaram Yun, Sangwoo Park |
Cryptanalysis of the Full HAVAL with 4 and 5 Passes. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
message modification, Hash function, collision, differential path |
1 | Taizo Shirai, Kyoji Shibutani |
On Feistel Structures Using a Diffusion Switching Mechanism. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Feistel structure, optimal diffusion mappings, blockcipher |
1 | Kaisa Nyberg, Johan Wallén |
Improved Linear Distinguishers for SNOW 2.0. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
SNOW 2.0, linear masking method, Stream cipher, modular addition |
1 | Shoichi Hirose |
Some Plausible Constructions of Double-Block-Length Hash Functions. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | John Black |
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Information-Theoretic Cryptography, Uninstantiability, Random-Oracle Model, Ideal-Cipher Model |
1 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Analysis of Step-Reduced SHA-256. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kazuhiko Minematsu, Yukiyasu Tsunoo |
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Differentially-uniform permutation, MAC, Block cipher, AES |
1 | Martin Schläffer, Elisabeth Oswald |
Searching for Differential Paths in MD4. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Antoine Joux, Frédéric Muller |
Chosen-Ciphertext Attacks Against MOSQUITO. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Mitsuru Matsui |
How Far Can We Go on the x64 Processors? |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Louis Granboulan, Éric Levieil, Gilles Piret |
Pseudorandom Permutation Families over Abelian Groups. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
arbitrary domain, differential and linear cryptanalysis, block cipher |
1 | Côme Berbain, Henri Gilbert, Alexander Maximov |
Cryptanalysis of Grain. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Stream cipher, Correlation attack, Walsh transform |
1 | Debrup Chakraborty, Palash Sarkar 0001 |
A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
tweakable encryption, strong pseudo-random permutation, mode of operation |
1 | Hongjun Wu 0001, Bart Preneel |
Cryptanalysis of the Stream Cipher DECIM. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
The Impact of Carries on the Complexity of Collision Attacks on SHA-1. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee 0002, Seokhie Hong, Jaesang Lee 0002, Dukjae Moon, Sungtaek Chee |
A New Dedicated 256-Bit Hash Function: FORK-256. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
256-bit Hash Function, FORK-256 |
1 | Frédéric Didier, Jean-Pierre Tillich |
Computing the Algebraic Immunity Efficiently. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Low degree multiple, Boolean functions, Stream ciphers, Algebraic attacks, Algebraic immunity, Annihilator |
1 | Matthias Krause 0001, Dirk Stegemann |
Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Bluetooth E0, GSM A5/1, cryptanalysis, Stream cipher, BDD, self-shrinking generator |
1 | John Kelsey, Stefan Lucks |
Collisions and Near-Collisions for Reduced-Round Tiger. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
hash function, attack, collisions, Tiger |
1 | Souradyuti Paul, Bart Preneel, Gautham Sekar |
Distinguishing Attacks on the Stream Cipher Py. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #201 - #300 of 615 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ >>] |
|