The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Cryptanalysis with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1969-1982 (17) 1983-1985 (15) 1986-1988 (18) 1989-1990 (17) 1991 (19) 1992-1993 (37) 1994 (34) 1995 (18) 1996 (26) 1997 (34) 1998 (48) 1999 (43) 2000 (56) 2001 (80) 2002 (91) 2003 (108) 2004 (113) 2005 (172) 2006 (171) 2007 (181) 2008 (222) 2009 (206) 2010 (142) 2011 (177) 2012 (171) 2013 (152) 2014 (175) 2015 (209) 2016 (205) 2017 (168) 2018 (186) 2019 (188) 2020 (158) 2021 (174) 2022 (160) 2023 (183) 2024 (43)
Publication types (Num. hits)
article(2176) book(10) incollection(26) inproceedings(1893) phdthesis(112)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2108 occurrences of 562 keywords

Results
Found 4217 publication records. Showing 4217 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Susan K. Langford Weakness in Some Threshold Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF cryptanalysis, digital signatures, secret sharing, undeniable signatures, threshold signatures, Threshold Cryptosystems
20Paul C. Kocher Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF cryptanalysis, DSS, RSA, Timing attack, Diffie-Hellman
20Miodrag J. Mihaljevic A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Binary sequence generators, MacLaren-Marsaglia shuffler, Cryptanalysis, Distance measures, Correlation attack
20Miodrag J. Mihaljevic, Jovan Dj. Golic Convergence of a Bayesian Iterative Error-Correction Procedure on a Noisy Shift register Sequence. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Algorithms, Cryptanalysis, Convergence, Decoding, Shift registers, Fast correlation attack
20Paul C. van Oorschot, Michael J. Wiener A Known Plaintext Attack on Two-Key Triple Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF Triple encryption, cryptanalysis, DES
20Tzonelih Hwang, T. R. N. Rao Secret Error-Correcting Codes (SECC). Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF Algebraic-Code Cryptosystem, Block Chaining, Ciphertext-Only Attach, Chosen -Plaintext Attach, Cryptographic Parameter, Data Reliability, Data Secrecy, JEEC, Known-Plaintext Attach, SECC, Work Factor, Cryptography, Data Integrity, Cryptanalysis, Data Security, Cryptosystems, Cryptology, Data Authenticity
20Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman Is the Data Encryption Standard a Group? (Preliminary Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptanalysis, Data Encryption Standard (DES), multiple encryption, Birthday Paradox
20Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). Search on Bibsonomy CRYPTO The full citation details ... 1985 DBLP  DOI  BibTeX  RDF closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptography, cryptanalysis, Data Encryption Standard (DES), cryptology, multiple encryption, Birthday Paradox
20Friedrich L. Bauer Cryptology - Methods and Maxims. Search on Bibsonomy EUROCRYPT The full citation details ... 1982 DBLP  DOI  BibTeX  RDF cipher systems, computational complexity.Computing Reviews Classification: D.3, cryptography, cryptanalysis, encryption, Cryptology
19Huaqun Wang, Futai Zhang, Yanfei Sun Cryptanalysis of a Generalized Ring Signature Scheme. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Alex Biryukov, Dmitry Khovratovich Related-Key Cryptanalysis of the Full AES-192 and AES-256. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AES, related-key attack, boomerang attack
19Florian Mendel, Christian Rechberger, Martin Schläffer, Søren S. Thomsen The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Grøstl, Maelstrom, hash function, collision attack, Whirlpool, near-collision
19Onur Özen, Kerem Varici, Cihangir Tezcan, Çelebi Kocair Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hight, Impossible Differential Attack, Present, Related-Key Attack, Rectangle Attack
19Orr Dunkelman, Nathan Keller Cryptanalysis of CTC2. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Shujun Li, Chengqing Li, Kwok-Tung Lo, Guanrong Chen Cryptanalysis of an Image Scrambling Scheme Without Bandwidth Expansion. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Jintai Ding, John Wagner Cryptanalysis of Rational Multivariate Public Key Cryptosystems. Search on Bibsonomy PQCrypto The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Maciej Nikodem DSA Signature Scheme Immune to the Fault Cryptanalysis. Search on Bibsonomy CARDIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Tim Güneysu, Christof Paar, Gerd Pfeiffer, Manfred Schimmler Enhancing COPACOBANA for advanced applications in cryptography and cryptanalysis. Search on Bibsonomy FPL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Vladimir Shpilrain Cryptanalysis of Stickel's Key Exchange Scheme. Search on Bibsonomy CSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg Multidimensional Linear Cryptanalysis of Reduced Round Serpent. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Yanlin Qin, Xiaoping Wu Cryptanalysis and Improvement of Two Blind Proxy Signature Schemes. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Meiqin Wang Differential Cryptanalysis of Reduced-Round PRESENT. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Onur Aciiçmez, Jean-Pierre Seifert, Çetin Kaya Koç Micro-Architectural Cryptanalysis. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Thomas Baignères, Jacques Stern, Serge Vaudenay Linear Cryptanalysis of Non Binary Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Mohammad Faisal Uddin, Anur M. Youssef Cryptanalysis of Pointcheval's identification scheme using ant colony optimization. Search on Bibsonomy IEEE Congress on Evolutionary Computation The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Christophe Clavier An Improved SCARE Cryptanalysis Against a Secret A3/A8 GSM Algorithm. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF GSM Authentication, A3/A8, Substitution Table, Reverse Engineering, Side Channel Analysis
19Benessa Defend, Kevin Fu, Ari Juels Cryptanalysis of Two Lightweight RFID Authentication Schemes. Search on Bibsonomy PerCom Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Thomas Peyrin Cryptanalysis of Grindahl. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Grindahl, hash functions, Rijndael
19Fanyu Kong, Jia Yu 0003, Baodong Qin, Daxing Li Cryptanalysis of Server-Aided RSA Key Generation Protocols at MADNES 2005. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Manuel Aguilar R., Héctor J. Fraire H., Laura Cruz Reyes, Juan Javier González Barbosa, Graciela Mora Guadalupe Castilla V., Claudia Gómez Santillán Classic Cryptanalysis Applied to Exons and Introns Prediction. Search on Bibsonomy ICCSA (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Xiaoyun Wang 0001 Some Mathematical Problems in Cryptanalysis. Search on Bibsonomy ASCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Alex Biryukov, Dmitry Khovratovich Two New Techniques of Side-Channel Cryptanalysis. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Ilya Mironov, Lintao Zhang Applications of SAT Solvers to Cryptanalysis of Hash Functions. Search on Bibsonomy SAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Thomas Johansson 0001, Willi Meier, Frédéric Muller Cryptanalysis of Achterbahn. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Leonie Ruth Simpson, Matthew Henricksen Improved Cryptanalysis of MAG. Search on Bibsonomy ACISP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Disting- uisher, MAG Keystream Generator, Cryptography, Stream Ciphers, Key Recovery
19Olivier Billet, Henri Gilbert Cryptanalysis of Rainbow. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF UOV (Unblanced Oil and Vinegar), Public Key Cryptography, Signature Schemes, Multivariate Cryptography, Rainbow
19Mohammad Faisal Uddin, Amr M. Youssef An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Jonathan Katz Comparative book review: Cryptography: An Introduction by V. V. Yaschenko (American Mathematical Society, 2002); Cryptanalysis of Number Theoretic Ciphers by S.S. Wagstaff, Jr. (Chapman & Hall/CRC Press, 2003); RSA and Public-Key Cryptography by R. A. Mollin (Chapman & Hall/CRC Press, 2003); Foundations of Cryptography, vol. 1: Basic Tools by O. Goldreich, (Cambridge University Press, 2001). Search on Bibsonomy SIGACT News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Frédéric Muller, Thomas Peyrin Linear Cryptanalysis of the TSC Family of Stream Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Jintai Ding, Dieter Schmidt Cryptanalysis of HFEv and Internal Perturbation of HFE. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Hidden field equation, internal perturbation, Public-key, multivariable, quadratic polynomials
19Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel Cryptanalysis of the Tractable Rational Map Cryptosystem. Search on Bibsonomy Public Key Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Tractable Rational Map Cryptosystem, XL, Gröbner Bases, Isomorphism of Polynomials, Public Key Cryptography, Polynomial Systems
19Hans Dobbertin, Lars R. Knudsen, Matthew J. B. Robshaw The Cryptanalysis of the AES - A Brief Survey. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Bo-Yin Yang, Jiun-Ming Chen, Nicolas T. Courtois On Asymptotic Security Estimates in XL and Gröbner Bases-Related Algebraic Cryptanalysis. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Tomasz Tyksinski Foundations of Differential Cryptanalysis in Abelian Groups. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Feng Bao 0001 Cryptanalysis of a New Cellular Automata Cryptosystem. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Bonwook Koo, Hwan Seok Jang, Jung Hwan Song Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion Layer. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee 0002 Impossible Differential Cryptanalysis for Block Cipher Structures. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Chris Karlof, David A. Wagner 0001 Hidden Markov Model Cryptanalysis. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Ramesh Karri, Kaijie Wu 0001, Piyush Mishra, Yongkook Kim Concurrent error detection schemes for fault-based side-channel cryptanalysis of symmetric block ciphers. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba Multiple Linear Cryptanalysis of a Reduced Round RC6. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Nicolas T. Courtois Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF overdefined systems of multivariate equations, MQ problem, Gröbner bases, ciphertext-only attacks, Toyocrypt-HR1, Toyocrypt-HS1, Cryptrec, stream ciphers, nonlinear filtering, pseudo-random generators, Multivariate cryptography, XL algorithm
19Ali Aydin Selçuk, Ali Biçak On Probability of Success in Linear and Differential Cryptanalysis. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Hitoshi Yanami, Takeshi Shimoyama Differential Cryptanalysis of a Reduced-Round SEED. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF symmetric block cipher, probability, differential attack, characteristic, SEED
19Hui-Feng Huang, Chin-Chen Chang 0001 Cryptanalysis of the WD Public-Key Cryptosystem. Search on Bibsonomy CW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Generalized inverses of matrix, public-key cryptosystem
19Louis Granboulan Flaws in Differential Cryptanalysis of Skipjack. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Vladimir Furman Differential Cryptanalysis of Nimbus. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Ulrich Kühn 0001 Cryptanalysis of Reduced-Round MISTY. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Soichi Furuya Slide Attacks with a Known-Plaintext Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Seonhee Lee, Seokhie Hong, Sangjin Lee 0002, Jongin Lim 0001, Seonhee Yoon Truncated Differential Cryptanalysis of Camellia. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Seyed J. Tabatabaian, Sam Ikeshiro, Murat Gumussoy, Mungal S. Dhanda A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Ramesh Karri, Kaijie Wu 0001, Piyush Mishra, Yongkook Kim Fault-Based Side-Channel Cryptanalysis Tolerant Rijndael Symmetric Block Cipher Architecture. Search on Bibsonomy DFT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Louis Goubin, Nicolas T. Courtois Cryptanalysis of the TTM Cryptosystem. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Eli Biham Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R). Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Ali Aydin Selçuk On Bias Estimation in Linear Cryptanalysis. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Johan Borst, Bart Preneel, Joos Vandewalle Linear Cryptanalysis of RC5 and RC6. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
19Solomon W. Golomb On the Cryptanalysis of Nonlinear Sequences. Search on Bibsonomy IMACC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
19Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng, Qin-Zhong Ye Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen Differential Cryptanalysis of the ICE Encryption Algorithm. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19David A. Wagner 0001 Differential Cryptanalysis of KHF. Search on Bibsonomy FSE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Xun Yi, Kwok-Yan Lam, Yongfei Han Differential Cryptanalysis of a Block Cipher. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Phong Q. Nguyen, Jacques Stern Merkle-Hellman Revisited: A Cryptanalysis of the Qu-Vanstone Cryptosystem Based on Group Factorizations. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
19Lars R. Knudsen, Matthew J. B. Robshaw Non-Linear Approximations in Linear Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
19John Kelsey, Bruce Schneier, David A. Wagner 0001 Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
19Claus-Peter Schnorr, Serge Vaudenay Black Box Cryptanalysis of Hash Networks Based on Multipermutations. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
19Kazuo Ohta, Kazumaro Aoki Linear Cryptanalysis of the Fast Data Encipherment Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
19Mitsuru Matsui The First Experimental Cryptanalysis of the Data Encryption Standard. Search on Bibsonomy CRYPTO The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
19Mitsuru Matsui Linear Cryptanalysis Method for DES Cipher. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
19Matthew Kwan Simultaneous Attacks in Differential Cryptanalysis (Getting More Pairs Per Encryption). Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
19Bruce Goldburg, Ed Dawson, S. Sridharan The Automated Cryptanalysis of Analog Speech Scramblers. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
19Jovan Dj. Golic, Miodrag J. Mihaljevic A Noisy Clock-Controlled Shift Register Cryptanalysis Concept Based on Sequence Comparion Approach. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
19Michael Bertilsson, Ernest F. Brickell, Ingemar Ingemarsson Cryptanalysis of Video Encryption Based on Space-Filling Curves. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
19Kencheng Zeng, Chung-Huang Yang, T. R. N. Rao On the Linear Consistency Test (LCT) in Cryptanalysis with Applications. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
19Kencheng Zeng, Minqiang Huang On the Linear Syndrome Method in Cryptanalysis. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
19Winfried B. Müller, Rupert Nöbauer Cryptanalysis of the Dickson Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
19Alan G. Konheim Cryptanalysis of ADFGVX Encipherment Systems (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
19Alan G. Konheim Cryptanalysis of a Kryha Machine. Search on Bibsonomy EUROCRYPT The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
17Pascal Junod, Marco Macchetti Revisiting the IDEA Philosophy. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IDEA block cipher, WIDEA compression function, Intel Core2 CPU, wordslice implementation
17Jiali Choy, Huihui Yap Impossible Boomerang Attack for Block Cipher Structures. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Impossible Boomerang Attack, Impossible Boomerang Distinguishers, Block Ciphers
17Artemios G. Voyiatzis, Dimitrios N. Serpanos The security of the Fiat-Shamir scheme in the presence of transient hardware faults. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fiat-Shamir identification scheme, cryptography, side-channel attacks, smartcards, Bellcore attack
17Bart Preneel The State of Hash Functions and the NIST SHA-3 Competition. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Stéphane Manuel, Thomas Peyrin Collisions on SHA-0 in One Hour. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash functions, SHA-0, boomerang attack
17Debojyoti Bhattacharya, Nitin Bansal, Amitava Banerjee, Dipanwita Roy Chowdhury A Near Optimal S-Box Design. Search on Bibsonomy ICISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cellular Automata, Algebraic Attack, S-box, Power Attack
17Dario Carluccio, Kerstin Lemke-Rust, Christof Paar, Ahmad-Reza Sadeghi E-Passport: The Global Traceability Or How to Feel Like a UPS Package. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MRTD, Basic Access Control, RF Eavesdropper, MRTD Cracker, Privacy, Biometrics, E-Passport
17Pallavi Joshi, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury Design and Analysis of a Robust and Efficient Block Cipher using Cellular Automata. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Debdeep Mukhopadhyay, Abhishek Chaudhary, Arvind Nebhnani, Dipanwita Roy Chowdhury CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Pascal Junod, Serge Vaudenay FOX : A New Family of Block Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Lai-Massey scheme, Block ciphers
17Marine Minier A Three Rounds Property of the AES. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Taizo Shirai, Bart Preneel On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF optimal diffusion mapping, active S-boxes, MDS, Feistel cipher
17Hervé Ledig, Frédéric Muller, Frédéric Valette Enhancing Collision Attacks. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 4217 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license