|
Conferences in DBLP
Reduced Complexity Attacks on the Alternating Step Generator. [Citation Graph (, )][DBLP]
Extended BDD-Based Cryptanalysis of Keystream Generators. [Citation Graph (, )][DBLP]
Two Trivial Attacks on Trivium. [Citation Graph (, )][DBLP]
Collisions for 70-Step SHA-1: On the Full Cost of Collision Search. [Citation Graph (, )][DBLP]
Cryptanalysis of the CRUSH Hash Function. [Citation Graph (, )][DBLP]
Improved Side-Channel Collision Attacks on AES. [Citation Graph (, )][DBLP]
Analysis of Countermeasures Against Access Driven Cache Attacks on AES. [Citation Graph (, )][DBLP]
Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms. [Citation Graph (, )][DBLP]
Koblitz Curves and Integer Equivalents of Frobenius Expansions. [Citation Graph (, )][DBLP]
Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic. [Citation Graph (, )][DBLP]
Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations. [Citation Graph (, )][DBLP]
Explicit Formulas for Efficient Multiplication in \mathbbF36m. [Citation Graph (, )][DBLP]
Linear Cryptanalysis of Non Binary Ciphers. [Citation Graph (, )][DBLP]
The Delicate Issues of Addition with Respect to XOR Differences. [Citation Graph (, )][DBLP]
MRHS Equation Systems. [Citation Graph (, )][DBLP]
A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software. [Citation Graph (, )][DBLP]
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings. [Citation Graph (, )][DBLP]
Cryptanalysis of White Box DES Implementations. [Citation Graph (, )][DBLP]
Attacks on the ESA-PSS-04-151 MAC Scheme. [Citation Graph (, )][DBLP]
The Security of the Extended Codebook (XCB) Mode of Operation. [Citation Graph (, )][DBLP]
A Generic Method to Design Modes of Operation Beyond the Birthday Bound. [Citation Graph (, )][DBLP]
Passive-Only Key Recovery Attacks on RC4. [Citation Graph (, )][DBLP]
Permutation After RC4 Key Scheduling Reveals the Secret Key. [Citation Graph (, )][DBLP]
Revisiting Correlation-Immunity in Filter Generators. [Citation Graph (, )][DBLP]
Distinguishing Attack Against TPypy. [Citation Graph (, )][DBLP]
|