Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Eric Rescorla |
Stone Knives and Bear Skins: Why Does the Internet Run on Pre-historic Cryptography? |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Santanu Sarkar 0001 |
Partial Key Exposure: Generalized Framework to Attack RSA. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Martin Ågren, Thomas Johansson 0001 |
Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christof Paar |
The Yin and Yang Sides of Embedded Security. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tanja Lange 0001 |
Elliptic Curves for Applications. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jens-Peter Kaps, Panasayya Yalla, Kishore Kumar Surapathi, Bilal Habib, Susheel Vadlamudi, Smriti Gurung, John Pham |
Lightweight Implementations of SHA-3 Candidates on FPGAs. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hemanta K. Maji, Manoj Prabhakaran 0001 |
The Limits of Common Coins: Further Results. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shashank Agrawal, Abhinav Mehta, Kannan Srinathan |
Secure Message Transmission in Asynchronous Directed Graphs. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Dhiman Saha, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury |
PKDPA: An Enhanced Probabilistic Differential Power Attack Methodology. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mohammad Hassan Habibi, Mohammad Reza Aref, Di Ma |
Addressing Flaws in RFID Authentication Protocols. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sourav Sen Gupta 0001, Anupam Chattopadhyay, Ayesha Khalid |
HiPAcc-LTE: An Integrated High Performance Accelerator for 3GPP LTE Stream Ciphers. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lakshmi Kuppusamy, Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juanma González Nieto |
Towards a Provably Secure DoS-Resilient Key Exchange Protocol with Perfect Forward Secrecy. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Roger Dingledine |
Tor and the Censorship Arms Race: Lessons Learned. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Robert Drylo |
On Constructing Families of Pairing-Friendly Elliptic Curves with Variable Discriminant. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michael Gorski, Thomas Knapke, Eik List, Stefan Lucks, Jakob Wenzel 0001 |
Mars Attacks! Revisited: - Differential Attack on 12 Rounds of the MARS Core and Defeating the Complex MARS Key-Schedule. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Phuong Ha Nguyen, Matthew J. B. Robshaw, Huaxiong Wang |
On Related-Key Attacks and KASUMI: The Case of A5/3. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Roy D'Souza, David Jao, Ilya Mironov, Omkant Pandey |
Publicly Verifiable Secret Sharing for Cloud-Based Key Management. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Maxime Nassar, Sylvain Guilley, Jean-Luc Danger |
Formal Analysis of the Entropy / Security Trade-off in First-Order Masking Countermeasures against Side-Channel Attacks. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar 0001 |
On the Evolution of GGHN Cipher. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Craig Costello, Kristin E. Lauter, Michael Naehrig |
Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Clavier, Benoit Feix, Georges Gagnerot, Mylène Roussellet, Vincent Verneuil |
Square Always Exponentiation. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | María Naya-Plasencia, Andrea Röck, Willi Meier |
Practical Analysis of Reduced-Round Keccak. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jin Hong 0001, Ga Won Lee 0003, Daegun Ma |
Analysis of the Parallel Distinguished Point Tradeoff. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Florian Mendel, Tomislav Nad |
Boomerang Distinguisher for the SIMD-512 Compression Function. |
INDOCRYPT |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Avradip Mandal, Jacques Patarin, Valérie Nachef |
Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sourav Sen Gupta 0001, Koushik Sinha, Subhamoy Maitra, Bhabani P. Sinha |
One Byte per Clock: A Novel RC4 Hardware. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mridul Nandi, Souradyuti Paul |
Speeding Up the Wide-Pipe: Secure and Fast Hashing. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Albrecht Petzoldt, Stanislav Bulygin, Johannes Buchmann 0001 |
CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu |
Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sedat Akleylek, Murat Cenk, Ferruh Özbudak |
Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Daniel J. Bernstein, Hsieh-Chung Chen, Chen-Mou Cheng, Tanja Lange 0001, Ruben Niederhagen, Peter Schwabe, Bo-Yin Yang |
ECC2K-130 on NVIDIA GPUs. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Meltem Sönmez Turan, Erdener Uyan |
Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bart Preneel |
Cryptographic Hash Functions: Theory and Practice. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Santanu Sarkar 0001, Sourav Sen Gupta 0001, Subhamoy Maitra |
Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fabien Herbaut, Pierre-Yvan Liardet, Nicolas Méloni, Yannick Teglia, Pascal Véron |
Random Euclidean Addition Chain Generation and Its Application to Point Multiplication. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Raymond Manley, David Gregg |
A Program Generator for Intel AES-NI Instructions. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Zhe Xia, Chris Culnane, James Heather, Hugo Jonker, Peter Y. A. Ryan, Steve A. Schneider, Sriramkrishnan Srinivasan |
Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mridul Nandi |
The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Cihangir Tezcan |
The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Emmanuel Prouff, Thomas Roche |
Attack on a Higher-Order Masking of the AES Based on Homographic Functions. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hamid Mala, Mohammad Dakhilalian, Vincent Rijmen, Mahmoud Modarres-Hashemi |
Improved Impossible Differential Cryptanalysis of 7-Round AES-128. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Neal Koblitz |
Getting a Few Things Right and Many Things Wrong. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Gregory V. Bard, Nicolas T. Courtois, Jorge Nakahara Jr., Pouyan Sepehrdad, Bingsheng Zhang |
Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ashish Kumar, Somitra Kumar Sanadhya, Praveen Gauravaram, Masoumeh Safkhani, Majid Naderi |
Cryptanalysis of Tav-128 Hash Function. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Stanislav Bulygin, Albrecht Petzoldt, Johannes Buchmann 0001 |
Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks |
New Boomerang Attacks on ARIA. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Yoni De Mulder, Brecht Wyseur, Bart Preneel |
Cryptanalysis of a Perturbated White-Box AES Implementation. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Paul Stankovski |
Greedy Distinguishers and Nonrandomness Detectors. |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Guang Gong, Kishan Chand Gupta (eds.) |
Progress in Cryptology - INDOCRYPT 2010 - 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings |
INDOCRYPT |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu, Feng Bao 0001 |
Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
non-committing encryption, oblivious Naor-Pinkas cryptosystem, Naor-Pinkas randomizer, adaptive security |
1 | Daniel J. Bernstein, Tanja Lange 0001, Ruben Niederhagen, Christiane Peters, Peter Schwabe |
FSBday. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Birthday, FSB - Wagner, not much Memory, SHA-3 |
1 | Zheng Gong, Pieter H. Hartel, Svetla Nikova, Bo Zhu 0007 |
Towards Secure and Practical MACs for Body Sensor Networks. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Colleen Swanson, David Jao |
A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
key agreement, certificateless public key cryptography |
1 | Johannes Buchmann 0001, Richard Lindner |
Secure Parameters for SWIFFT. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
hash functions, lattices, post-quantum cryptography |
1 | Florian Mendel, Tomislav Nad |
A Distinguisher for the Compression Function of SIMD-512. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, SIMD, distinguisher, SHA-3 candidate |
1 | Julien Bringer, Hervé Chabanne, Gérard D. Cohen, Bruno Kindarji |
Private Interrogation of Devices via Identification Codes. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Polynomial Reconstruction Problem, Privacy, Identification |
1 | Gildas Avoine, Christian Floerkemeier, Benjamin Martin 0002 |
RFID Distance Bounding Multistate Enhancement. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Mafia fraud, Authentication, RFID, Distance bounding |
1 | Arpita Patra, Ashish Choudhary, C. Pandu Rangan |
Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Information Theoretic Security, Multiparty Computation, Error Probability |
1 | Julien Bringer, Hervé Chabanne, Thomas Icart |
On Physical Obfuscation of Cryptographic Algorithms. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
POK, stream ciphers, masking, RFID tags, PUF |
1 | S. Sharmila Deva Selvi, S. Sree Vivek, J. Shriram, S. Kalaivani, C. Pandu Rangan |
Identity Based Aggregate Signcryption Schemes. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Aggregate Signcryption, Provable Security, Bilinear Pairings, Random Oracle Model, Identity Based Cryptography |
1 | Laila El Aimani |
On Generic Constructions of Designated Confirmer Signatures. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Designated Confirmer signatures, Reduction/meta-reduction, Zero Knowledge, Generic construction |
1 | Orr Dunkelman, Ewan Fleischmann, Michael Gorski, Stefan Lucks |
Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
HAS-160, differential cryptanalysis, related-key rectangle attack |
1 | Bimal K. Roy, Nicolas Sendrier (eds.) |
Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Thierry P. Berger, Marine Minier, Benjamin Pousse |
Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, stream cipher, software design, FCSRs |
1 | Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin |
Fault Analysis of Rabbit: Toward a Secret Key Leakage. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
carry analysis, Stream cipher, fault attacks, Rabbit |
1 | Markus Rückert |
Verifiably Encrypted Signatures from RSA without NIZKs. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Online contract signing, RSA, Merkle hash trees |
1 | Hüseyin Demirci, Ihsan Taskin, Mustafa Çoban, Adnan Baysal |
Improved Meet-in-the-Middle Attacks on AES. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, AES, Rijndael, meet-in-the-middle attack |
1 | Mahabir Prasad Jhanwar, Rana Barua |
Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
RSA Group, Free Group, Quadratic Residues |
1 | Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nandi |
Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Indifferentiability, Merkle-Damgård, HAIFA, Tree mode of operations with counter |
1 | Olivier Billet, Kaoutar Elkhiyaoui |
Two Attacks against the Ff RFID Protocol. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Takahiro Matsuda 0002, Kanta Matsuura, Jacob C. N. Schuldt |
Efficient Constructions of Signcryption Schemes and Signcryption Composability. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
multi-user security, signcryption, generic construction |
1 | Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu |
Reusing Static Keys in Key Agreement Protocols. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Conrado Porto Lopes Gouvêa, Julio César López-Hernández |
Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
wireless sensor networks, pairing based cryptography, software implementation |
1 | Dong Su, Kewei Lv |
A New Hard-Core Predicate of Paillier's Trapdoor Function. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Paillier’s trapdoor function, Hard-core Predicate, Most significant bit |
1 | Kota Ideguchi, Dai Watanabe |
Second Preimage Attack on SHAMATA-512. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
SHAMATA, hash function, second preimage attack, SHA-3 candidate |
1 | Chester Rebeiro, Debdeep Mukhopadhyay, Junko Takahashi, Toshinori Fukunaga |
Cache Timing Attacks on Clefia. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Gérald Gavin, Marine Minier |
Oblivious Multi-variate Polynomial Evaluation. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Homomorphic encryption schemes, Oblivious Polynomial Evaluation (OPE), semantic security |
1 | Sumanta Sarkar |
On the Symmetric Negabent Boolean Functions. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
negabent function, nega-Hadamard transform, Krawtchouk polynomial, Boolean function, bent function, symmetric Boolean function |
1 | Kazuki Yoneyama |
Efficient and Strongly Secure Password-Based Server Aided Key Exchange (Extended Abstract). |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
password-based key exchange, password-based server aided key exchange, leakage of internal states, undetectable on-line dictionary attack |
1 | Gaetan Bisson, Takakazu Satoh |
More Discriminants with the Brezing-Weng Method. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Pairing-friendly curve generation, Brezing-Weng method |
1 | Michal Hojsík, Bohuslav Rudolf |
Floating Fault Analysis of Trivium. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
stream cipher, Trivium, differential fault analysis |
1 | Mridul Nandi |
Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
online cipher, CBC, universal hash function, random permutation |
1 | Daniel J. Bernstein, Peter Schwabe |
New AES Software Speed Records. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
AES, software implementation |
1 | Mete Akgün, Pinar Kavak, Hüseyin Demirci |
New Results on the Key Scheduling Algorithm of RC4. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Key Scheduling Algorithm, State Table, Cryptanalysis, Stream Cipher, RC4 |
1 | Arpita Patra, Ashish Choudhary, C. Pandu Rangan |
Round Efficient Unconditionally Secure Multiparty Computation Protocol. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Information Theoretic Security, Multiparty Computation |
1 | Mukesh Agrawal, Sandip Karmakar, Dhiman Saha, Debdeep Mukhopadhyay |
Scan Based Side Channel Attacks on Stream Ciphers and Their Counter-Measures. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jens-Peter Kaps |
Chai-Tea, Cryptographic Hardware Implementations of xTEA. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
symmetric key algorithms, TEA, XTEA, FPGA, ASIC, Efficient implementation |
1 | Jean-Philippe Aumasson |
Faster Multicollisions. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
hash function, collision |
1 | Jing Yang, Zhenfeng Zhang |
A New Anonymous Password-Based Authenticated Key Exchange Protocol. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Password-based AKE, Anonymous authentication |
1 | Sorina Ionica, Antoine Joux |
Another Approach to Pairing Computation in Edwards Coordinates. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Miller’s algorithm, Edwards coordinates, Tate pairing |
1 | Chester Rebeiro, Debdeep Mukhopadhyay |
High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Lucks, Erik Zenner, André Weimerskirch, Dirk Westhoff |
Concrete Security for Entity Recognition: The Jane Doe Protocol. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Orr Dunkelman, Sebastiaan Indesteege, Nathan Keller |
A Differential-Linear Attack on 12-Round Serpent. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Yanli Ren, Dawu Gu |
Secure Hierarchical Identity Based Encryption Scheme in the Standard Model. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Shahram Khazaei, Willi Meier |
New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Self-synchronizing Stream Ciphers, T-functions, Key Recovery |
1 | Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao |
Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Threshold Multi Authority ABE, Without a central authority |
1 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
New Collision Attacks against Up to 24-Step SHA-2. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 hash family, reduced round attacks, Cryptanalysis |
1 | Dipanwita Roy Chowdhury, Vincent Rijmen, Abhijit Das 0004 (eds.) |
Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jirí Vábek, Daniel Joscák, Milan Bohácek, Jirí Tuma |
A New Type of 2-Block Collisions in MD5. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Stevens algorithm, collisions, MD5, differential paths |
1 | Jiqiang Lu, Orr Dunkelman, Nathan Keller, Jongsung Kim |
New Impossible Differential Attacks on AES. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
AES, Impossible differential cryptanalysis |