Conferences in DBLP
Helena Handschuh , Henri Gilbert x^{2} Cryptanalysis of the SEAL Encryption Algorithm. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:1-12 [Conf ] Carlo Harpes , James L. Massey Partitioning Cryptanalysis. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:13-27 [Conf ] Thomas Jakobsen , Lars R. Knudsen The Interpolation Attack on Block Ciphers. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:28-40 [Conf ] Kazumaro Aoki , Kunio Kobayashi , Shiho Moriai Best Differential Characteristic Search of FEAL. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:41-53 [Conf ] Mitsuru Matsui New Block Encryption Algorithm MISTY. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:54-68 [Conf ] Matthew Kwan The Design of the ICE Encryption Algorithm. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:69-82 [Conf ] Advanced Encryption Standard. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:83-87 [Conf ] Cunsheng Ding , Valtteri Niemi , Ari Renvall , Arto Salomaa TWOPRIME: A Fast Stream Ciphering Algorithm. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:88-102 [Conf ] Markus Dichtl On Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:103-106 [Conf ] Ross J. Anderson , Charalampos Manifavas Chameleon - A New Kind of Stream Cipher. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:107-113 [Conf ] Kouichi Sakurai , Souichi Furuya Improving Linear Cryptanalysis of LOKI91 by Probabilistic Counting Method. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:114-133 [Conf ] Eli Biham Cryptanalysis of Ladder-DES. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:134-138 [Conf ] Vincent Rijmen , Bart Preneel A Family of Trapdoor Ciphers. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:139-148 [Conf ] Joan Daemen , Lars R. Knudsen , Vincent Rijmen The Block Cipher Square. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:149-165 [Conf ] David M'Raïhi , David Naccache , Jacques Stern , Serge Vaudenay XMX: A Firmware-Oriented Block Cipher Based on Modular Multiplications. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:166-171 [Conf ] Shai Halevi , Hugo Krawczyk MMH: Software Message Authentication in the Gbit/Second Rates. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:172-189 [Conf ] Valentine Afanassiev , Christian Gehrmann , Ben J. M. Smeets Fast Message Authentication Using Efficient Polynomial Evaluation. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:190-204 [Conf ] Gideon Yuval Reinventing the Travois: Encryption/MAC in 30 ROM Bytes. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:205-209 [Conf ] Ronald L. Rivest All-or-Nothing Encryption and the Package Transform. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:210-218 [Conf ] Stefan Lucks On the Security of Remotely Keyed Encryption. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:219-229 [Conf ] Adam Young , Moti Yung Sliding Encryption: A Cryptographic Tool for Mobile Agents. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:230-241 [Conf ] Bruce Schneier , Doug Whiting Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:242-259 [Conf ] Eli Biham A Fast New DES Implementation in Software. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:260-272 [Conf ] Craig S. K. Clapp Optimizing a Fast Stream Cipher for VLIW, SIMD, and Superscalar Processors. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1997, pp:273-287 [Conf ]