|
Conferences in DBLP
Collisions for Step-Reduced SHA-256. [Citation Graph (, )][DBLP]
Collisions on SHA-0 in One Hour. [Citation Graph (, )][DBLP]
The Hash Function Family LAKE. [Citation Graph (, )][DBLP]
SWIFFT: A Modest Proposal for FFT Hashing. [Citation Graph (, )][DBLP]
A Unified Approach to Related-Key Attacks. [Citation Graph (, )][DBLP]
Algebraic and Slide Attacks on KeeLoq. [Citation Graph (, )][DBLP]
A Meet-in-the-Middle Attack on 8-Round AES. [Citation Graph (, )][DBLP]
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. [Citation Graph (, )][DBLP]
SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags. [Citation Graph (, )][DBLP]
Differential Fault Analysis of Trivium. [Citation Graph (, )][DBLP]
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. [Citation Graph (, )][DBLP]
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. [Citation Graph (, )][DBLP]
Cryptanalysis of LASH. [Citation Graph (, )][DBLP]
A (Second) Preimage Attack on the GOST Hash Function. [Citation Graph (, )][DBLP]
Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator. [Citation Graph (, )][DBLP]
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. [Citation Graph (, )][DBLP]
Efficient Reconstruction of RC4 Keys from Internal States. [Citation Graph (, )][DBLP]
An Improved Security Bound for HCTR. [Citation Graph (, )][DBLP]
How to Encrypt with a Malicious Random Number Generator. [Citation Graph (, )][DBLP]
A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier. [Citation Graph (, )][DBLP]
Post-Processing Functions for a Biased Physical Random Number Generator. [Citation Graph (, )][DBLP]
Entropy of the Internal State of an FCSR in Galois Representation. [Citation Graph (, )][DBLP]
Bit-Pattern Based Integral Attack. [Citation Graph (, )][DBLP]
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. [Citation Graph (, )][DBLP]
Impossible Differential Cryptanalysis of CLEFIA. [Citation Graph (, )][DBLP]
MD4 is Not One-Way. [Citation Graph (, )][DBLP]
Improved Indifferentiability Security Analysis of chopMD Hash Function. [Citation Graph (, )][DBLP]
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. [Citation Graph (, )][DBLP]
On the Salsa20 Core Function. [Citation Graph (, )][DBLP]
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. [Citation Graph (, )][DBLP]
|