|
Conferences in DBLP
Block and Stream Ciphers and the Creatures in Between. [Citation Graph (, )][DBLP]
How Fast can be Algebraic Attacks on Block Ciphers?. [Citation Graph (, )][DBLP]
Why IV Setup for Stream Ciphers is Difficult. [Citation Graph (, )][DBLP]
A Collision-Resistant Rate-1 Double-Block-Length Hash Function. [Citation Graph (, )][DBLP]
A Key-Recovery Attack on SOBER-128. [Citation Graph (, )][DBLP]
07021 Abstracts Collection -- Symmetric Cryptography. [Citation Graph (, )][DBLP]
Tightness of the Security Bound of CENC. [Citation Graph (, )][DBLP]
QUAD: Overview and Recent Developments. [Citation Graph (, )][DBLP]
Design and Primitive Specification for Shannon. [Citation Graph (, )][DBLP]
07021 Executive Summary -- Symmetric Cryptography. [Citation Graph (, )][DBLP]
Cryptographic Shuffling of Random and Pseudorandom Sequences. [Citation Graph (, )][DBLP]
|