The SCEAS System
Navigation Menu

Conferences in DBLP

Fast Software Encryption (FSE) (fse)
1997 (conf/fse/1997)

  1. Helena Handschuh, Henri Gilbert
    x2 Cryptanalysis of the SEAL Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:1-12 [Conf]
  2. Carlo Harpes, James L. Massey
    Partitioning Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:13-27 [Conf]
  3. Thomas Jakobsen, Lars R. Knudsen
    The Interpolation Attack on Block Ciphers. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:28-40 [Conf]
  4. Kazumaro Aoki, Kunio Kobayashi, Shiho Moriai
    Best Differential Characteristic Search of FEAL. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:41-53 [Conf]
  5. Mitsuru Matsui
    New Block Encryption Algorithm MISTY. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:54-68 [Conf]
  6. Matthew Kwan
    The Design of the ICE Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:69-82 [Conf]

  7. Advanced Encryption Standard. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:83-87 [Conf]
  8. Cunsheng Ding, Valtteri Niemi, Ari Renvall, Arto Salomaa
    TWOPRIME: A Fast Stream Ciphering Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:88-102 [Conf]
  9. Markus Dichtl
    On Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:103-106 [Conf]
  10. Ross J. Anderson, Charalampos Manifavas
    Chameleon - A New Kind of Stream Cipher. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:107-113 [Conf]
  11. Kouichi Sakurai, Souichi Furuya
    Improving Linear Cryptanalysis of LOKI91 by Probabilistic Counting Method. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:114-133 [Conf]
  12. Eli Biham
    Cryptanalysis of Ladder-DES. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:134-138 [Conf]
  13. Vincent Rijmen, Bart Preneel
    A Family of Trapdoor Ciphers. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:139-148 [Conf]
  14. Joan Daemen, Lars R. Knudsen, Vincent Rijmen
    The Block Cipher Square. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:149-165 [Conf]
  15. David M'Raïhi, David Naccache, Jacques Stern, Serge Vaudenay
    XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:166-171 [Conf]
  16. Shai Halevi, Hugo Krawczyk
    MMH: Software Message Authentication in the Gbit/Second Rates. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:172-189 [Conf]
  17. Valentine Afanassiev, Christian Gehrmann, Ben J. M. Smeets
    Fast Message Authentication Using Efficient Polynomial Evaluation. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:190-204 [Conf]
  18. Gideon Yuval
    Reinventing the Travois: Encryption/MAC in 30 ROM Bytes. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:205-209 [Conf]
  19. Ronald L. Rivest
    All-or-Nothing Encryption and the Package Transform. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:210-218 [Conf]
  20. Stefan Lucks
    On the Security of Remotely Keyed Encryption. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:219-229 [Conf]
  21. Adam Young, Moti Yung
    Sliding Encryption: A Cryptographic Tool for Mobile Agents. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:230-241 [Conf]
  22. Bruce Schneier, Doug Whiting
    Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:242-259 [Conf]
  23. Eli Biham
    A Fast New DES Implementation in Software. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:260-272 [Conf]
  24. Craig S. K. Clapp
    Optimizing a Fast Stream Cipher for VLIW, SIMD, and Superscalar Processors. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:273-287 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002