Conferences in DBLP
Eyüp Serdar Ayaz , Ali Aydin Selçuk Improved DST Cryptanalysis of IDEA. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:1-14 [Conf ] Wentao Zhang , Wenling Wu , Lei Zhang , Dengguo Feng Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:15-27 [Conf ] Orr Dunkelman , Nathan Keller , Jongsung Kim Related-Key Rectangle Attack on the Full SHACAL-1. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:28-44 [Conf ] Martin Hell , Thomas Johansson Cryptanalysis of Achterbahn-Version 2. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:45-55 [Conf ] Hongjun Wu , Bart Preneel Cryptanalysis of the Stream Cipher ABC v2. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:56-66 [Conf ] Alex Biryukov The Design of a Stream Cipher LEX. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:67-75 [Conf ] Thomas Baignères , Matthieu Finiasz Dial C for Cipher. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:76-95 [Conf ] Kazuhiko Minematsu Improved Security Analysis of XEX and LRW Modes. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:96-113 [Conf ] Martin Hlavác , Tomás Rosa Extended Hidden Number Problem and Its Cryptanalytic Applications. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:114-133 [Conf ] Kris Tiri , Patrick Schaumont Changing the Odds Against Masked Logic. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:134-146 [Conf ] Michael Neve , Jean-Pierre Seifert Advances on Access-Driven Cache Attacks on AES. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:147-162 [Conf ] Helena Handschuh , Bart Preneel Blind Differential Cryptanalysis for Enhanced Power Attacks. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:163-173 [Conf ] Côme Berbain , Olivier Billet , Henri Gilbert Efficient Implementations of Multivariate Quadratic Systems. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:174-187 [Conf ] Masayuki Yoshino , Katsuyuki Okeya , Camille Vuillaume Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:188-202 [Conf ] Roberto Maria Avanzi Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:203-219 [Conf ] Martin Hell , Thomas Johansson On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:220-233 [Conf ] Bin Zhang , Dengguo Feng Multi-pass Fast Correlation Attack on Stream Ciphers. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:234-248 [Conf ] Joo Yeon Cho , Josef Pieprzyk Crossword Puzzle Attack on NLS. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:249-265 [Conf ] Matthieu Finiasz , Serge Vaudenay When Stream Cipher Analysis Meets Public-Key Cryptography. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:266-284 [Conf ] Roberto Maria Avanzi , Clemens Heuberger , Helmut Prodinger On Redundant tau -Adic Expansions and Non-adjacent Digit Sets. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:285-301 [Conf ] Colm O'Eigeartaigh , Michael Scott Pairing Calculation on Supersingular Genus 2 Curves. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:302-316 [Conf ] Peter Birkner Efficient Divisor Class Halving on Genus Two Curves. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:317-326 [Conf ] Ted Krovetz Message Authentication on 64-Bit Architectures. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:327-341 [Conf ] Goce Jakimoski Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:342-357 [Conf ] Moses Liskov Constructing an Ideal Hash Function from Weak Ideal Compression Functions. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:358-375 [Conf ] Charanjit S. Jutla , Anindya C. Patthak Provably Good Codes for Hash Function Design. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2006, pp:376-393 [Conf ]