The SCEAS System
Navigation Menu

Conferences in DBLP

Selected Areas in Cryptography (SAC) (sacrypt)
2006 (conf/sacrypt/2006)

  1. Eyüp Serdar Ayaz, Ali Aydin Selçuk
    Improved DST Cryptanalysis of IDEA. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:1-14 [Conf]
  2. Wentao Zhang, Wenling Wu, Lei Zhang, Dengguo Feng
    Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:15-27 [Conf]
  3. Orr Dunkelman, Nathan Keller, Jongsung Kim
    Related-Key Rectangle Attack on the Full SHACAL-1. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:28-44 [Conf]
  4. Martin Hell, Thomas Johansson
    Cryptanalysis of Achterbahn-Version 2. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:45-55 [Conf]
  5. Hongjun Wu, Bart Preneel
    Cryptanalysis of the Stream Cipher ABC v2. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:56-66 [Conf]
  6. Alex Biryukov
    The Design of a Stream Cipher LEX. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:67-75 [Conf]
  7. Thomas Baignères, Matthieu Finiasz
    Dial C for Cipher. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:76-95 [Conf]
  8. Kazuhiko Minematsu
    Improved Security Analysis of XEX and LRW Modes. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:96-113 [Conf]
  9. Martin Hlavác, Tomás Rosa
    Extended Hidden Number Problem and Its Cryptanalytic Applications. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:114-133 [Conf]
  10. Kris Tiri, Patrick Schaumont
    Changing the Odds Against Masked Logic. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:134-146 [Conf]
  11. Michael Neve, Jean-Pierre Seifert
    Advances on Access-Driven Cache Attacks on AES. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:147-162 [Conf]
  12. Helena Handschuh, Bart Preneel
    Blind Differential Cryptanalysis for Enhanced Power Attacks. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:163-173 [Conf]
  13. Côme Berbain, Olivier Billet, Henri Gilbert
    Efficient Implementations of Multivariate Quadratic Systems. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:174-187 [Conf]
  14. Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume
    Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:188-202 [Conf]
  15. Roberto Maria Avanzi
    Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:203-219 [Conf]
  16. Martin Hell, Thomas Johansson
    On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:220-233 [Conf]
  17. Bin Zhang, Dengguo Feng
    Multi-pass Fast Correlation Attack on Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:234-248 [Conf]
  18. Joo Yeon Cho, Josef Pieprzyk
    Crossword Puzzle Attack on NLS. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:249-265 [Conf]
  19. Matthieu Finiasz, Serge Vaudenay
    When Stream Cipher Analysis Meets Public-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:266-284 [Conf]
  20. Roberto Maria Avanzi, Clemens Heuberger, Helmut Prodinger
    On Redundant tau -Adic Expansions and Non-adjacent Digit Sets. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:285-301 [Conf]
  21. Colm O'Eigeartaigh, Michael Scott
    Pairing Calculation on Supersingular Genus 2 Curves. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:302-316 [Conf]
  22. Peter Birkner
    Efficient Divisor Class Halving on Genus Two Curves. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:317-326 [Conf]
  23. Ted Krovetz
    Message Authentication on 64-Bit Architectures. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:327-341 [Conf]
  24. Goce Jakimoski
    Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:342-357 [Conf]
  25. Moses Liskov
    Constructing an Ideal Hash Function from Weak Ideal Compression Functions. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:358-375 [Conf]
  26. Charanjit S. Jutla, Anindya C. Patthak
    Provably Good Codes for Hash Function Design. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2006, pp:376-393 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002