The SCEAS System
Navigation Menu

Conferences in DBLP

Fast Software Encryption (FSE) (fse)
2008 (conf/fse/2008)


  1. Collisions for Step-Reduced SHA-256. [Citation Graph (, )][DBLP]


  2. Collisions on SHA-0 in One Hour. [Citation Graph (, )][DBLP]


  3. The Hash Function Family LAKE. [Citation Graph (, )][DBLP]


  4. SWIFFT: A Modest Proposal for FFT Hashing. [Citation Graph (, )][DBLP]


  5. A Unified Approach to Related-Key Attacks. [Citation Graph (, )][DBLP]


  6. Algebraic and Slide Attacks on KeeLoq. [Citation Graph (, )][DBLP]


  7. A Meet-in-the-Middle Attack on 8-Round AES. [Citation Graph (, )][DBLP]


  8. Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. [Citation Graph (, )][DBLP]


  9. SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags. [Citation Graph (, )][DBLP]


  10. Differential Fault Analysis of Trivium. [Citation Graph (, )][DBLP]


  11. Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. [Citation Graph (, )][DBLP]


  12. Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. [Citation Graph (, )][DBLP]


  13. Cryptanalysis of LASH. [Citation Graph (, )][DBLP]


  14. A (Second) Preimage Attack on the GOST Hash Function. [Citation Graph (, )][DBLP]


  15. Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator. [Citation Graph (, )][DBLP]


  16. New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. [Citation Graph (, )][DBLP]


  17. Efficient Reconstruction of RC4 Keys from Internal States. [Citation Graph (, )][DBLP]


  18. An Improved Security Bound for HCTR. [Citation Graph (, )][DBLP]


  19. How to Encrypt with a Malicious Random Number Generator. [Citation Graph (, )][DBLP]


  20. A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier. [Citation Graph (, )][DBLP]


  21. Post-Processing Functions for a Biased Physical Random Number Generator. [Citation Graph (, )][DBLP]


  22. Entropy of the Internal State of an FCSR in Galois Representation. [Citation Graph (, )][DBLP]


  23. Bit-Pattern Based Integral Attack. [Citation Graph (, )][DBLP]


  24. Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. [Citation Graph (, )][DBLP]


  25. Impossible Differential Cryptanalysis of CLEFIA. [Citation Graph (, )][DBLP]


  26. MD4 is Not One-Way. [Citation Graph (, )][DBLP]


  27. Improved Indifferentiability Security Analysis of chopMD Hash Function. [Citation Graph (, )][DBLP]


  28. New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. [Citation Graph (, )][DBLP]


  29. On the Salsa20 Core Function. [Citation Graph (, )][DBLP]


  30. New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002