The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase block ciphers (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-1992 (16) 1993-1996 (20) 1997-1998 (36) 1999-2000 (39) 2001 (24) 2002 (24) 2003 (35) 2004 (47) 2005 (38) 2006 (51) 2007 (46) 2008 (55) 2009 (49) 2010 (25) 2011 (17) 2012 (41) 2013 (38) 2014 (34) 2015 (47) 2016 (34) 2017 (50) 2018 (44) 2019 (9)
Publication types (Num. hits)
article(273) book(1) incollection(11) inproceedings(520) phdthesis(14)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 634 occurrences of 233 keywords

Results
Found 819 publication records. Showing 819 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
154Nicolas Courtois The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF interpolation attack on block ciphers, fractional transformations, homographic functions, generalised linear cryptanalysis, bi-linear cryptanalysis, Block ciphers, AES, Rijndael, Feistel ciphers, multivariate equations
126James L. Massey, Ueli M. Maurer, Muzhong Wang Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
122Moses Liskov, Ronald L. Rivest, David A. Wagner 0001 Tweakable Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF tweakable block ciphers, initialization vector, block ciphers, modes of operation
114Debra L. Cook, Moti Yung, Angelos D. Keromytis Elastic block ciphers: method, security and instantiations. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Elastic block ciphers, Variable-length block ciphers, Reduction proof, Security analysis, Key recovery attacks
86Johann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann 0007, Marcel Medwed Energy evaluation of software implementations of block ciphers under memory constraints. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF energy optimization, code size reduction, symmetric cipher, lightweight cryptography, memory footprint
84Debra L. Cook, Angelos D. Keromytis, Moti Yung Elastic block ciphers: the basic design. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF elastic block ciphers, variable-length block ciphers, encryption, block ciphers
83Christophe De Cannière, Orr Dunkelman, Miroslav Knezevic KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
83Shoichi Hirose Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
83Nicolas Courtois, Josef Pieprzyk Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MQ problem, overdefined systems of multivariate equations, Gröbner bases, sparse multivariate polynomials, Multivariate Cryptanalysis, Block ciphers, AES, Rijndael, Square, Camellia, Serpent, XL algorithm, multivariate quadratic equations
82Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck CryptoGraphics: Secret Key Cryptography Using Graphics Cards. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Graphics Processing Unit, Stream Ciphers, Block Ciphers, AES
82Debra L. Cook, Moti Yung, Angelos D. Keromytis The Security of Elastic Block Ciphers Against Key-Recovery Attacks. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Variable-length block ciphers, reduction proof, security analysis, key recovery attacks
82Pawel Chodowiec, Po Khuon, Kris Gaj Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining. Search on Bibsonomy FPGA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF fast architectures, secret-key ciphers, pipelining, AES
82Thomas Jakobsen, Lars R. Knudsen The Interpolation Attack on Block Ciphers. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
79Thomas Johansson 0001 Analysis and Design of Modern Stream Ciphers: (Invited Paper) p. Search on Bibsonomy IMA Int. Conf. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
77Jovan Dj. Golic Modes of Operation of Stream Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF keyed hash functions, security, Stream ciphers, block ciphers, hash functions, conversions
75Souradyuti Paul, Bart Preneel On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
74Adam J. Elbirt, Christof Paar Instruction-Level Distributed Processing for Symmetric-Key Cryptography. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF algorithm-agility, FPGA, cryptography, VHDL, block cipher
74Jorge Nakahara Jr. Faster Variants of the MESH Block Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF byte-oriented block ciphers, smart cards, algebraic attacks, IDEA
73Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee, Dukjae Moon Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. Search on Bibsonomy IMA Int. Conf. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cobra-H64, Cobra-H128, Block Ciphers, Related-Key Attacks, Data-Dependent Permutations
73Nicolas Courtois General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF polynomial relations, design of cryptographic primitives, generalised linear cryptanalysis, multivariate public key encryption and signature schemes, Quartz, combiners with memory, elimination methods, Gröbner bases, Boolean functions, stream ciphers, block ciphers, AES, finite fields, algebraic attacks, Rijndael, Serpent, HFE, Sflash, multivariate equations
71Ermaliza Razali, Raphael C.-W. Phan, Marc Joye On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pseudorandom permutation (PRP), key recovery (KR), related key attacks (RKA), block cipher, Provable security
69Raphael C.-W. Phan, Mohammad Umar Siddiqi A Framework for Describing Block Cipher Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF framework, cryptanalysis, generalization, Encryption, block ciphers, distinguishers
68Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel A New Approach to chi2 Cryptanalysis of Block Ciphers. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ? 2, square and linear cryptanalysis, Block ciphers
65Debra L. Cook, Moti Yung, Angelos D. Keromytis Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security analysis, differential cryptanalysis, linear cryptanalysis
65Adam J. Elbirt, Christof Paar An Instruction-Level Distributed Processor for Symmetric-Key Cryptography. Search on Bibsonomy IEEE Trans. Parallel Distrib. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF algorithm-agility, FPGA, Cryptography, VHDL, block cipher
65Pascal Junod, Serge Vaudenay FOX : A New Family of Block Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Lai-Massey scheme, Block ciphers
65Alex Biryukov, Christophe De Cannière Block Ciphers and Systems of Quadratic Equations. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Khazad, Misty, Block ciphers, linearization, Rijndael, Camellia, Serpent, multivariate quadratic equations
64Jorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle The MESH Block Ciphers. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
62Jovan Dj. Golic DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Keyed reversible circuits, data scrambling, probing attacks, block ciphers, power analysis, countermeasures
62Helger Lipmaa IDEA: A Cipher For Multimedia Architectures? Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF multimedia architectures, Pentium MMX, block ciphers, IDEA, fast implementations
61Lan Luo, Zhiguang Qin, Shijie Zhou A Comment to the Intelligent Functions of Different Weight Ciphers. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
61Johannes A. Buchmann, Andrei Pyshkin, Ralf-Philipp Weinmann Block Ciphers Sensitive to Gröbner Basis Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
58Rüdiger Weis, Stefan Lucks Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers. Search on Bibsonomy ECMAST The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Luby-Rackoff ciphers, BEAR, LION, BEAST, JAVA, Performance, block cipher
57Keke Wu, Huiyun Li, Bo Peng, Fengqi Yu Correlation Power Analysis Attack against Synchronous Stream Ciphers. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
56Nicolas Courtois, Blandine Debraize Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF algebraic attacks on block ciphers, Gröbner bases, design of S-boxes, Rijndael, algebraic immunity, Serpent, multivariate equations
55Lars R. Knudsen, David A. Wagner 0001 Integral Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MISTY, integrals, Cryptanalysis, block ciphers
55Anne Canteaut, Marion Videau Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF higher order differential cryptanalysis, Boolean functions, Block ciphers, nonlinearity
55Onur Özen, Kerem Varici, Cihangir Tezcan, Çelebi Kocair Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hight, Impossible Differential Attack, Present, Related-Key Attack, Rectangle Attack
55Olivier Billet, Henri Gilbert A Traceable Block Cipher. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Matsumoto-Imai, multivariate cryptology, symmetric cryptology, block ciphers, traitor tracing, collusion resistance
55Xuejia Lai, James L. Massey, Sean Murphy Markov Ciphers and Differential Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
52Yassin M. Hasan, Hesham A. Abulenein Key-linked block ciphers with input-output shuffling applied to remotely keyed encryption. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
52Helen Gustafson, Ed Dawson, William J. Caelli Comparison of Block Ciphers. Search on Bibsonomy AUSCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
50Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson Bit-Pattern Based Integral Attack. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integral cryptanalysis, Noekeon, Block ciphers, present, Serpent
50Orr Dunkelman, Nathan Keller A New Criterion for Nonlinearity of Block Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Xuejia Lai, James L. Massey Hash Function Based on Block Ciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
48Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin On Compression of Data Encrypted with Block Ciphers. Search on Bibsonomy DCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
48Alexander Klimov, Adi Shamir New Applications of T-Functions in Block Ciphers and Hash Functions. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Jiali Choy, Huihui Yap Impossible Boomerang Attack for Block Cipher Structures. Search on Bibsonomy IWSEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Impossible Boomerang Attack, Impossible Boomerang Distinguishers, Block Ciphers
48Charanjit S. Jutla Encryption Modes with Almost Free Message Integrity. Search on Bibsonomy J. Cryptology The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pairwise independent, Parallelizable, Authentication, Encryption, Block ciphers
48Chris Hall, David A. Wagner 0001, John Kelsey, Bruce Schneier Building PRFs from PRPs. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cipher feedback mode, block ciphers, pseudo-random functions, pseudo-random permutations, concrete security
48Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten Differential Power Analysis of Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain
48Don Coppersmith, Shai Halevi, Charanjit S. Jutla Cryptanalysis of Stream Ciphers with Linear Masking. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Linear masking, Low-Diffusion attacks, Stream ciphers, Hypothesis testing, Linear cryptanalysis
48Alex Biryukov, Adi Shamir Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF time/memory tradeoff attacks, Cryptanalysis, stream ciphers
47Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram Efficient Constructions of Variable-Input-Length Block Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47Bart Preneel, René Govaerts, Joos Vandewalle Hash Functions Based on Block Ciphers: A Synthetic Approach. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
47Donghoon Chang, Wonil Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee, Soo Hak Sung Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
47Lars R. Knudsen, Bart Preneel Fast and Secure Hashing Based on Codes. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
47Ju-Sung Kang, Seongtaek Chee, Choonsik Park A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF (probabilistic) higher order differential attack, two-block structure, provable security, LC, DC
47Danilo Gligoroski, Suzana Andova, Svein J. Knapskog On the Importance of the Key Separation Principle for Different Modes of Operation. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF quasigroup string transformations, block ciphers, modes of operation
47Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong The Related-Key Rectangle Attack - Application to SHACAL-1. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF The Rectangle Attack, The Related-Key Attack, The Related-Key Rectangle Attack, SHACAL-1, Block Ciphers
47Taekeon Lee, Jongsung Kim, Changhoon Lee, Jaechul Sung, Sangjin Lee, Dowon Hong Padding Oracle Attacks on Multiple Modes of Operation. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Padding oracle attacks, Multiple modes of operation, Block ciphers
47Shai Halevi, Don Coppersmith, Charanjit S. Jutla Scream: A Software-Efficient Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Round functions, Stream ciphers, Block ciphers, SEAL
47Alex Biryukov, Adi Shamir Structural Cryptanalysis of SASAS. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Structural cryptanalysis, substitution permutation networks, substitution affine networks, Cryptanalysis, block ciphers, Rijndael
46Orr Dunkelman, Nathan Keller A New Criterion for Nonlinearity of Block Ciphers. Search on Bibsonomy IEEE Trans. Information Theory The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Howard M. Heys Analysis of the Statistical Cipher Feedback Mode of Block Ciphers. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block cipher modes, Cryptography, synchronization, stream ciphers, error propagation
46Ramesh Karri, Grigori Kuznetsov, Michael Gössel Parity-Based Concurrent Error Detection of Substitution-Permutation Network Block Ciphers. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
44Eli Biham Cryptanalysis of Multiple Modes of Operation. Search on Bibsonomy J. Cryptology The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Block ciphers, Block ciphers, Modes of operation, Modes of operation, Key words, Multiple modes, Multiple modes
44Lars R. Knudsen, Xuejia Lai, Bart Preneel Attacks on Fast Double Block Length Hash Functions. Search on Bibsonomy J. Cryptology The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Cryptanalysis, Cryptanalysis, Block ciphers, Block ciphers, Key words, Cryptographic hash functions, Cryptographic hash functions, Birthday attacks, Birthday attacks, Double block length hash functions, Double block length hash functions
44Ivan Damgård, Lars R. Knudsen Two-Key Triple Encryption. Search on Bibsonomy J. Cryptology The full citation details ... 1998 DBLP  DOI  BibTeX  RDF The Data Encryption Standard, The Data Encryption Standard, Block ciphers, Block ciphers, Pseudorandom generators, Pseudorandom generators, Key words, Multiple encryption, Multiple encryption
43Charlie Obimbo, Behzad Salami 0002 A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. Search on Bibsonomy The Journal of Supercomputing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Inverse of a matrix, Row-echelon reduction, Parallel Algorithms, Cryptography, Block Ciphers, Modular arithmetic, Systems of linear equations
43Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater Improving the Time Complexity of Matsui's Linear Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fast Fourier Transform, block ciphers, linear cryptanalysis
43Claude Carlet Concatenating Indicators of Flats for Designing Cryptographic Functions. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF stream and block ciphers, Boolean functions
43Serge Vaudenay Decorrelation: A Theory for Block Cipher Security. Search on Bibsonomy J. Cryptology The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Cryptanalysis, Block ciphers, Pseudorandomness
43Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen GEM: A Generic Chosen-Ciphertext Secure Encryption Method. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF generic conversion, stream ciphers, block ciphers, Public-key encryption, random oracle model, chosen-ciphertext security, hybrid encryption
43Joan Daemen, René Govaerts, Joos Vandewalle A Hardware Design Model for Cryptographic Algorithms. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Hardware Cryptography, Pseudorandom Sequence Generators, Stream Ciphers, Block Ciphers, Cryptographic Hash Functions
43Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. Search on Bibsonomy FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Aroor Dinesh Dileep, Chellu Chandra Sekhar Identification of Block Ciphers using Support Vector Machines. Search on Bibsonomy IJCNN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
43Creighton T. R. Hager, Scott F. Midkiff, Jung-Min Park 0001, Thomas L. Martin Performance and Energy Efficiency of Block Ciphers in Personal Digital Assistants. Search on Bibsonomy PerCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Pascal Junod, Serge Vaudenay Perfect Diffusion Primitives for Block Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
43Akashi Satoh, Sumio Morioka Unified Hardware Architecture for 128-Bit Block Ciphers AES and Camellia. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
43Lars R. Knudsen Contemporary Block Ciphers. Search on Bibsonomy Lectures on Data Security The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
43Serge Vaudenay Provable Security for Block Ciphers by Decorrelation. Search on Bibsonomy STACS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
43Gary Carter, Ed Dawson, Lauren Nielsen Key Schedules of Iterative Block Ciphers. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
42Nikhil Joshi, Jayachandran Sundararajan, Kaijie Wu 0001, Bo Yang 0010, Ramesh Karri Tamper Proofing by Design Using Generalized Involution-Based Concurrent Error Detection for Involutional Substitution Permutation and Feistel Networks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Subsitution Permutation Networks (SPN), ANUBIS, TwoFish, cryptography, Concurrent Error Detection (CED), tamper proofing, Feistel networks
42Imran Erguler, Emin Anarim A New Cryptanalytic Time-Memory Trade-Off for Stream Ciphers. Search on Bibsonomy ISCIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury Cellular Automata : An Ideal Candidate for a Block Cipher. Search on Bibsonomy ICDCIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cycle Structure, Self-invertibility, Cellular Automata, Block Ciphers, Non-linearity
41Yevgeniy Dodis, John P. Steinberger Message Authentication Codes from Unpredictable Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
41Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya A New Mode of Operation for Block Ciphers and Length-Preserving MACs. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
41Ermaliza Razali, Raphael C.-W. Phan On the Existence of Related-Key Oracles in Cryptosystems Based on Block Ciphers. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Yuliang Zheng, Tsutomu Matsumoto, Hideki Imai On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
40Youngdai Ko, Changhoon Lee, Seokhie Hong, Jaechul Sung, Sangjin Lee Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CIKS-128, CIKS-128H, Related-Key Differential Attack, Block Cipher, Data-Dependent Operation
40Yee Wei Law, Jeroen Doumen, Pieter H. Hartel Survey and benchmark of block ciphers for wireless sensor networks. Search on Bibsonomy TOSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Sensor networks, cryptography, energy efficiency, block ciphers
40Duong Anh Duc, Tran Minh Triet, Luong Han Co The Extended Rijndael-like Block Ciphers. Search on Bibsonomy ITCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Rijndael Block Cipher, Extended Rijndael-like Block Ciphers, Advanced Encryption Standard
39Gilles Piret, François-Xavier Standaert Provable security of block ciphers against linear cryptanalysis: a mission impossible? Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A60
39Yassin M. Hasan From stream to provably secure block ciphers based on pseudorandom matrix transformations. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
39Eli Biham, Orr Dunkelman, Nathan Keller New Combined Attacks on Block Ciphers. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Akashi Satoh, Sumio Morioka Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
39Valér Canda, Tran van Trung, Spyros S. Magliveras, Tamás Horváth 0002 Symmetric Block Ciphers Based on Group Bases. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
39Richard Cleve Complexity Theoretic Issues Concerning Block Ciphers Related to D.E.S. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
39Jonathan J. Hoch, Adi Shamir Fault Analysis of Stream Ciphers. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Lili-128, SOBER-t32, Stream cipher, LFSR, fault attack, RC4
Displaying result #1 - #100 of 819 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license