The SCEAS System
Navigation Menu

Conferences in DBLP

Fast Software Encryption (FSE) (fse)
2009 (conf/fse/2009)


  1. Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. [Citation Graph (, )][DBLP]


  2. An Efficient State Recovery Attack on X-FCSR-256. [Citation Graph (, )][DBLP]


  3. Key Collisions of the RC4 Stream Cipher. [Citation Graph (, )][DBLP]


  4. Intel's New AES Instructions for Enhanced Performance and Security. [Citation Graph (, )][DBLP]


  5. Blockcipher-Based Hashing Revisited. [Citation Graph (, )][DBLP]


  6. On the Security of Tandem-DM. [Citation Graph (, )][DBLP]


  7. Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. [Citation Graph (, )][DBLP]


  8. Cryptanalysis of RadioGatún. [Citation Graph (, )][DBLP]


  9. Preimage Attacks on Reduced Tiger and SHA-2. [Citation Graph (, )][DBLP]


  10. Cryptanalysis of the LAKE Hash Family. [Citation Graph (, )][DBLP]


  11. New Cryptanalysis of Block Ciphers with Low Algebraic Degree. [Citation Graph (, )][DBLP]


  12. Algebraic Techniques in Differential Cryptanalysis. [Citation Graph (, )][DBLP]


  13. Multidimensional Extension of Matsui's Algorithm 2. [Citation Graph (, )][DBLP]


  14. Meet-in-the-Middle Attacks on SHA-3 Candidates. [Citation Graph (, )][DBLP]


  15. Practical Collisions for EnRUPT. [Citation Graph (, )][DBLP]


  16. The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. [Citation Graph (, )][DBLP]


  17. Revisiting the IDEA Philosophy. [Citation Graph (, )][DBLP]


  18. Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2). [Citation Graph (, )][DBLP]


  19. Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. [Citation Graph (, )][DBLP]


  20. Enhanced Target Collision Resistant Hash Functions Revisited. [Citation Graph (, )][DBLP]


  21. MAC Reforgeability. [Citation Graph (, )][DBLP]


  22. New Distinguishing Attack on MAC Using Secret-Prefix Method. [Citation Graph (, )][DBLP]


  23. Fast and Secure CBC-Type MAC Algorithms. [Citation Graph (, )][DBLP]


  24. HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002