The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "FSE"( http://dblp.L3S.de/Venues/FSE )

URL (DBLP): http://dblp.uni-trier.de/db/conf/fse

Publication years (Num. hits)
1993 (26) 1994 (30) 1995-1996 (20) 1997 (25) 1998 (21) 1999 (23) 2000 (21) 2001 (29) 2002 (23) 2003 (28) 2004 (32) 2005 (30) 2006 (28) 2007 (29) 2008 (31) 2009 (25) 2010 (22) 2011 (24) 2012 (26) 2013 (30) 2014 (32) 2015 (30) 2016 (30)
Publication types (Num. hits)
inproceedings(592) proceedings(23)
Venues (Conferences, Journals, ...)
FSE(615)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 399 occurrences of 174 keywords

Results
Found 615 publication records. Showing 615 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Bing Sun 0001, Longjiang Qu, Chao Li 0002 New Cryptanalysis of Block Ciphers with Low Algebraic Degree. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF interpolation attack, integral attack, block cipher, Feistel cipher
1Alex Biryukov, Praveen Gauravaram, Jian Guo 0001, Dmitry Khovratovich, San Ling, Krystian Matusiewicz, Ivica Nikolic, Josef Pieprzyk, Huaxiong Wang Cryptanalysis of the LAKE Hash Family. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Martijn Stam Blockcipher-Based Hashing Revisited. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Tetsu Iwata, Kan Yasuda HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SIV, Universal hash function, security proof, counter mode
1Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp Weinmann Meet-in-the-Middle Attacks on SHA-3 Candidates. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Grøstl, Maelstrom, hash function, collision attack, Whirlpool, near-collision
1Sebastiaan Indesteege, Bart Preneel Practical Collisions for EnRUPT. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF EnRUPT, hash function, collision attack, SHA-3 candidate
1Mitsuru Matsui Key Collisions of the RC4 Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Thomas Fuhr 0001, Thomas Peyrin Cryptanalysis of RadioGatún. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF RadioGatún, cryptanalysis, hash functions
1John Black, Martin Cochran MAC Reforgeability. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Provable Security, Message Authentication Codes, Birthday Attacks
1Takanori Isobe 0001, Kyoji Shibutani Preimage Attacks on Reduced Tiger and SHA-2. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger
1Orr Dunkelman (eds.) Fast Software Encryption, 16th International Workshop, FSE 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Xiaoyun Wang 0001, Wei Wang 0035, Keting Jia, Meiqin Wang New Distinguishing Attack on MAC Using Secret-Prefix Method. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secret prefix method, MAC, distinguishing attack, SHA-1
1Yevgeniy Dodis, Leonid Reyzin, Ronald L. Rivest, Emily Shen Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jean-Philippe Aumasson, Itai Dinur, Willi Meier, Adi Shamir Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shay Gueron Intel's New AES Instructions for Enhanced Performance and Security. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF new instructions set, computer architecture, Advanced Encryption Standard
1Pascal Junod, Marco Macchetti Revisiting the IDEA Philosophy. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IDEA block cipher, WIDEA compression function, Intel Core2 CPU, wordslice implementation
1Jean-Philippe Aumasson, Jorge Nakahara Jr., Pouyan Sepehrdad Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2). Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ISDB, ARIB, MULTI2, block cipher, linear cryptanalysis, conditional access
1Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg Multidimensional Extension of Matsui's Algorithm 2. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Michal Hojsík, Bohuslav Rudolf Differential Fault Analysis of Trivium. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Trivium stream cipher, fault injection, differential fault analysis
1Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HMAC, Key recovery attack, Second preimage attack, NMAC, HAVAL
1Ivica Nikolic, Alex Biryukov Collisions for Step-Reduced SHA-256. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Blandine Debraize, Louis Goubin Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF guess-and-determine attacks, stream cipher, SAT solver, algebraic cryptanalysis, self-shrinking generator, multivariate quadratic equations
1Eli Biham, Orr Dunkelman, Nathan Keller A Unified Approach to Related-Key Attacks. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Donghoon Chang, Mridul Nandi Improved Indifferentiability Security Analysis of chopMD Hash Function. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jean-Philippe Aumasson, Simon Fischer 0002, Shahram Khazaei, Willi Meier, Christian Rechberger New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan The Hash Function Family LAKE. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HAIFA, Randomized hashing, Salt, Wide-pipe, Hash function
1Kan Yasuda A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF birthday barrier, tweak, quasi-random function, message authentication code, mode of operation, checksum, pseudo-random function, compression function, domain extension
1Debrup Chakraborty, Mridul Nandi An Improved Security Bound for HCTR. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jean-Jacques Quisquater On the Salsa20 Core Function. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Salsa20, cryptanalysis, hash function, collision
1Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo Impossible Differential Cryptanalysis of CLEFIA. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF diffusion switching mechanism, generalized Feistel structure, block cipher, impossible differential cryptanalysis, CLEFIA
1Adi Shamir SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SQUASH, RFID, MAC, Hash function, provable security
1Eli Biham, Yaniv Carmeli Efficient Reconstruction of RC4 Keys from Internal States. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Initial Permutation, Cryptanalysis, Stream Cipher, RC4, Key Scheduling
1Kaisa Nyberg (eds.) Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Hüseyin Demirci, Ali Aydin Selçuk A Meet-in-the-Middle Attack on 8-Round AES. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF meet-in-the-middle cryptanalysis, square attack, AES, Rijndael
1Vadim Lyubashevsky, Daniele Micciancio, Chris Peikert, Alon Rosen SWIFFT: A Modest Proposal for FFT Hashing. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Subhamoy Maitra, Goutam Paul 0001 New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Key Leakage, Cryptanalysis, Stream Cipher, Bias, RC4, Keystream
1Nicolas T. Courtois, Gregory V. Bard, David A. Wagner 0001 Algebraic and Slide Attacks on KeeLoq. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF unbalanced Feistel ciphers, Gröbner bases, KeeLoq, block ciphers, SAT solvers, algebraic cryptanalysis, slide attacks
1Florian Mendel, Norbert Pramstaller, Christian Rechberger A (Second) Preimage Attack on the GOST Hash Function. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash functions, preimage attack
1Stéphane Manuel, Thomas Peyrin Collisions on SHA-0 in One Hour. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, SHA-0, boomerang attack
1Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Patrick Lacharme Post-Processing Functions for a Biased Physical Random Number Generator. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF linear correcting codes, entropy, Fourier transform, bias, resilient functions
1Seny Kamara, Jonathan Katz How to Encrypt with a Malicious Random Number Generator. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Private-key encryption, random number generation
1Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo 0001, San Ling, Huaxiong Wang Cryptanalysis of LASH. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson Bit-Pattern Based Integral Attack. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integral cryptanalysis, Noekeon, Block ciphers, present, Serpent
1Eli Biham New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Andrea Röck Entropy of the Internal State of an FCSR in Galois Representation. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Gaëtan Leurent MD4 is Not One-Way. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cryptanalysis, hash function, preimage, MD4, one-way
1Markus Dichtl Bad and Good Ways of Post-processing Biased Physical Random Numbers. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF quasigroup, physical random numbers, bias, post-processing
1Simon Fischer 0002, Willi Meier Algebraic Immunity of S-Boxes and Augmented Functions. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Augmented Function, Stream Cipher, Algebraic Attack, S-box, Trivium, Filter Generator
1Orhun Kara, Cevat Manap A New Class of Weak Keys for Blowfish. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Blowfish, key dependent S-Box, self similarity analysis, cryptanalysis, fixed point, weak key, reflection attack
1Chu-Wee Lim, Khoongming Khoo An Analysis of XSL Applied to BES. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF XSL algorithm, AES, linearisation, BES
1Eli Biham, Orr Dunkelman, Nathan Keller Improved Slide Attacks. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Hongjun Wu 0001, Bart Preneel Differential-Linear Attacks Against the Stream Cipher Phelix. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Côme Berbain, Henri Gilbert On the Security of IV Dependent Stream Ciphers. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IV setup, stream cipher, provable security, PRNG
1Jongsung Kim, Seokhie Hong, Bart Preneel Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block Ciphers, AES, Related-Key Rectangle Attack
1Alex Biryukov (eds.) Fast Software Encryption, 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Gregor Leander, Christof Paar, Axel Poschmann, Kai Schramm New Lightweight DES Variants. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DESL, S-box design criteria, RFID, DES, lightweight cryptography
1Kazuhiko Minematsu, Toshiyasu Matsushima New Bounds for PMAC, TMAC, and XCBC. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk Cryptanalysis of FORK-256. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FORK-256, micro-collisions, cryptanalysis, hash functions
1Joan Daemen, Gilles Van Assche Producing Collisions for Panama, Instantaneously. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash function, collision, symmetric cryptography
1Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai Algebraic Cryptanalysis of 58-Round SHA-1. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Gröbner basis, SHA-1, differential attack
1Louis Granboulan, Thomas Pornin Perfect Block Ciphers with Small Blocks. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe Generalized Correlation Analysis of Vectorial Boolean Functions. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Vectorial Boolean Functions, Unrestricted Nonlinearity, Resiliency
1Thomas Ristenpart, Phillip Rogaway How to Enrich the Message Space of a Cipher. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Deterministic encryption, enciphering scheme, length-preserving encryption, multipermutation, symmetric encryption
1Bo-Yin Yang, Chia-Hsin Owen Chen, Daniel J. Bernstein, Jiun-Ming Chen Analysis of QUAD Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen The Grindahl Hash Functions. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hash functions, AES, Rijndael, proposal, design strategy
1Eli Biham, Orr Dunkelman, Nathan Keller A New Attack on 6-Round IDEA. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Håkan Englund, Martin Hell, Thomas Johansson 0001 Two General Attacks on Pomaranch-Like Keystream Generators. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF resynchronization attack, Stream ciphers, distinguishing attack, eSTREAM, Pomaranch
1Gaëtan Leurent Message Freedom in MD4 and MD5 Collisions: Application to APOP. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF message modification, meaningful collisions, APOP security, Hash function, MD5, MD4
1María Naya-Plasencia Cryptanalysis of Achterbahn-128/80. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack
1Yannick Seurin, Thomas Peyrin Security Analysis of Constructions Combining FIL Random Oracles. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF block ciphers, hash functions, provable security, random oracle, compression functions
1Antoine Joux, Jean-René Reinhard Overtaking VEST. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF inner collision, chosen IV attack, Stream cipher
1Yu Sasaki, Lei Wang 0031, Kazuo Ohta, Noboru Kunihiro New Message Difference for MD4. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Message Difference, Hash Function, Collision Attack, MD4, Local Collision, Differential Path
1Kris Tiri, Onur Aciiçmez, Michael Neve, Flemming Andersen An Analytical Model for Time-Driven Cache Attacks. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata The 128-Bit Blockcipher CLEFIA (Extended Abstract). Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF generalized Feistel structure, DSM, blockcipher, CLEFIA
1Yevgeniy Dodis, Krzysztof Pietrzak Improving the Security of MACs Via Randomized Message Preprocessing. Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Yassir Nawaz, Guang Gong, Kishan Chand Gupta Upper Bounds on Algebraic Immunity of Boolean Power Functions. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Inverse exponent, Kasami exponent, Niho exponent, Algebraic attacks, Algebraic immunity, Power functions, Polynomial functions
1Hongbo Yu, Xiaoyun Wang 0001, Aaram Yun, Sangwoo Park Cryptanalysis of the Full HAVAL with 4 and 5 Passes. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF message modification, Hash function, collision, differential path
1Taizo Shirai, Kyoji Shibutani On Feistel Structures Using a Diffusion Switching Mechanism. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Feistel structure, optimal diffusion mappings, blockcipher
1Kaisa Nyberg, Johan Wallén Improved Linear Distinguishers for SNOW 2.0. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SNOW 2.0, linear masking method, Stream cipher, modular addition
1Shoichi Hirose Some Plausible Constructions of Double-Block-Length Hash Functions. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1John Black The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Information-Theoretic Cryptography, Uninstantiability, Random-Oracle Model, Ideal-Cipher Model
1Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen Analysis of Step-Reduced SHA-256. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Kazuhiko Minematsu, Yukiyasu Tsunoo Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Differentially-uniform permutation, MAC, Block cipher, AES
1Martin Schläffer, Elisabeth Oswald Searching for Differential Paths in MD4. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Antoine Joux, Frédéric Muller Chosen-Ciphertext Attacks Against MOSQUITO. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mitsuru Matsui How Far Can We Go on the x64 Processors? Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Louis Granboulan, Éric Levieil, Gilles Piret Pseudorandom Permutation Families over Abelian Groups. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF arbitrary domain, differential and linear cryptanalysis, block cipher
1Côme Berbain, Henri Gilbert, Alexander Maximov Cryptanalysis of Grain. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Stream cipher, Correlation attack, Walsh transform
1Debrup Chakraborty, Palash Sarkar 0001 A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF tweakable encryption, strong pseudo-random permutation, mode of operation
1Hongjun Wu 0001, Bart Preneel Cryptanalysis of the Stream Cipher DECIM. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen The Impact of Carries on the Complexity of Collision Attacks on SHA-1. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee 0002, Seokhie Hong, Jaesang Lee 0002, Dukjae Moon, Sungtaek Chee A New Dedicated 256-Bit Hash Function: FORK-256. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 256-bit Hash Function, FORK-256
1Frédéric Didier, Jean-Pierre Tillich Computing the Algebraic Immunity Efficiently. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Low degree multiple, Boolean functions, Stream ciphers, Algebraic attacks, Algebraic immunity, Annihilator
1Matthias Krause 0001, Dirk Stegemann Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bluetooth E0, GSM A5/1, cryptanalysis, Stream cipher, BDD, self-shrinking generator
1John Kelsey, Stefan Lucks Collisions and Near-Collisions for Reduced-Round Tiger. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hash function, attack, collisions, Tiger
1Souradyuti Paul, Bart Preneel, Gautham Sekar Distinguishing Attacks on the Stream Cipher Py. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 615 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license