The SCEAS System
Navigation Menu

Conferences in DBLP

Fast Software Encryption (FSE) (fse)
2007 (conf/fse/2007)

  1. Joan Daemen, Gilles Van Assche
    Producing Collisions for Panama, Instantaneously. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:1-18 [Conf]
  2. Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk
    Cryptanalysis of FORK-256. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:19-38 [Conf]
  3. Lars R. Knudsen, Christian Rechberger, Søren S. Thomsen
    The Grindahl Hash Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:39-57 [Conf]
  4. Antoine Joux, Jean-René Reinhard
    Overtaking VEST. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:58-72 [Conf]
  5. María Naya-Plasencia
    Cryptanalysis of Achterbahn-128/80. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:73-86 [Conf]
  6. Hongjun Wu, Bart Preneel
    Differential-Linear Attacks Against the Stream Cipher Phelix. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:87-100 [Conf]
  7. Thomas Ristenpart, Phillip Rogaway
    How to Enrich the Message Space of a Cipher. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:101-118 [Conf]
  8. Yannick Seurin, Thomas Peyrin
    Security Analysis of Constructions Combining FIL Random Oracles. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:119-136 [Conf]
  9. Markus Dichtl
    Bad and Good Ways of Post-processing Biased Physical Random Numbers. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:137-152 [Conf]
  10. Eli Biham, Orr Dunkelman, Nathan Keller
    Improved Slide Attacks. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:153-166 [Conf]
  11. Orhun Kara, Cevat Manap
    A New Class of Weak Keys for Blowfish. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:167-180 [Conf]
  12. Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata
    The 128-Bit Blockcipher CLEFIA (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:181-195 [Conf]
  13. Gregor Leander, Christof Paar, Axel Poschmann, Kai Schramm
    New Lightweight DES Variants. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:196-210 [Conf]
  14. Eli Biham, Orr Dunkelman, Nathan Keller
    A New Attack on 6-Round IDEA. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:211-224 [Conf]
  15. Jongsung Kim, Seokhie Hong, Bart Preneel
    Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:225-241 [Conf]
  16. Chu-Wee Lim, Khoongming Khoo
    An Analysis of XSL Applied to BES. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:242-253 [Conf]
  17. Côme Berbain, Henri Gilbert
    On the Security of IV Dependent Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:254-273 [Conf]
  18. Håkan Englund, Martin Hell, Thomas Johansson
    Two General Attacks on Pomaranch-Like Keystream Generators. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:274-289 [Conf]
  19. Bo-Yin Yang, Owen Chia-Hsin Chen, Daniel J. Bernstein, Jiun-Ming Chen
    Analysis of QUAD [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:290-308 [Conf]
  20. Gaëtan Leurent
    Message Freedom in MD4 and MD5 Collisions: Application to APOP. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:309-328 [Conf]
  21. Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro
    New Message Difference for MD4. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:329-348 [Conf]
  22. Makoto Sugita, Mitsuru Kawazoe, Ludovic Perret, Hideki Imai
    Algebraic Cryptanalysis of 58-Round SHA-1. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:349-365 [Conf]
  23. Simon Fischer 0002, Willi Meier
    Algebraic Immunity of S-Boxes and Augmented Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:366-381 [Conf]
  24. Claude Carlet, Khoongming Khoo, Chu-Wee Lim, Chuan-Wen Loe
    Generalized Correlation Analysis of Vectorial Boolean Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:382-398 [Conf]
  25. Kris Tiri, Onur Aciiçmez, Michael Neve, Flemming Andersen
    An Analytical Model for Time-Driven Cache Attacks. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:399-413 [Conf]
  26. Yevgeniy Dodis, Krzysztof Pietrzak
    Improving the Security of MACs Via Randomized Message Preprocessing. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:414-433 [Conf]
  27. Kazuhiko Minematsu, Toshiyasu Matsushima
    New Bounds for PMAC, TMAC, and XCBC. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:434-451 [Conf]
  28. Louis Granboulan, Thomas Pornin
    Perfect Block Ciphers with Small Blocks. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:452-465 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002