Conferences in DBLP
Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium. [Citation Graph (, )][DBLP ] An Efficient State Recovery Attack on X-FCSR-256. [Citation Graph (, )][DBLP ] Key Collisions of the RC4 Stream Cipher. [Citation Graph (, )][DBLP ] Intel's New AES Instructions for Enhanced Performance and Security. [Citation Graph (, )][DBLP ] Blockcipher-Based Hashing Revisited. [Citation Graph (, )][DBLP ] On the Security of Tandem-DM. [Citation Graph (, )][DBLP ] Indifferentiability of Permutation-Based Compression Functions and Tree-Based Modes of Operation, with Applications to MD6. [Citation Graph (, )][DBLP ] Cryptanalysis of RadioGatún. [Citation Graph (, )][DBLP ] Preimage Attacks on Reduced Tiger and SHA-2. [Citation Graph (, )][DBLP ] Cryptanalysis of the LAKE Hash Family. [Citation Graph (, )][DBLP ] New Cryptanalysis of Block Ciphers with Low Algebraic Degree. [Citation Graph (, )][DBLP ] Algebraic Techniques in Differential Cryptanalysis. [Citation Graph (, )][DBLP ] Multidimensional Extension of Matsui's Algorithm 2. [Citation Graph (, )][DBLP ] Meet-in-the-Middle Attacks on SHA-3 Candidates. [Citation Graph (, )][DBLP ] Practical Collisions for EnRUPT. [Citation Graph (, )][DBLP ] The Rebound Attack: Cryptanalysis of Reduced Whirlpool and Grøstl. [Citation Graph (, )][DBLP ] Revisiting the IDEA Philosophy. [Citation Graph (, )][DBLP ] Cryptanalysis of the ISDB Scrambling Algorithm (MULTI2). [Citation Graph (, )][DBLP ] Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. [Citation Graph (, )][DBLP ] Enhanced Target Collision Resistant Hash Functions Revisited. [Citation Graph (, )][DBLP ] MAC Reforgeability. [Citation Graph (, )][DBLP ] New Distinguishing Attack on MAC Using Secret-Prefix Method. [Citation Graph (, )][DBLP ] Fast and Secure CBC-Type MAC Algorithms. [Citation Graph (, )][DBLP ] HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. [Citation Graph (, )][DBLP ]