The SCEAS System
Navigation Menu

Conferences in DBLP

Fast Software Encryption (FSE) (fse)
1993 (conf/fse/1993)

  1. James L. Massey
    SAFER K-64: A Byte-Oriented Block-Ciphering Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:1-17 [Conf]
  2. Joan Daemen, René Govaerts, Joos Vandewalle
    A New Approach to Block Cipher Design. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:18-32 [Conf]
  3. Burton S. Kaliski Jr., Matthew J. B. Robshaw
    Fast Block Cipher Proposal. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:33-40 [Conf]
  4. Uwe Blöcher, Markus Dichtl
    Fish: A Fast Software Stream Cipher. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:41-44 [Conf]
  5. Hugo Krawczyk
    The Shrinking Generator: Some Practical Considerations. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:45-46 [Conf]
  6. Ross J. Anderson
    A Modern Rotor Machine. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:47-50 [Conf]
  7. William G. Chambers
    Two Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:51-55 [Conf]
  8. Phillip Rogaway, Don Coppersmith
    A Software-Optimised Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:56-63 [Conf]
  9. T. Mark A. Lomas
    Encrypting Network Traffic. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:64-70 [Conf]
  10. Bart Preneel
    Design Principles for Dedicated Hash Functions. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:71-82 [Conf]
  11. Michael Roe
    Performance of Symmetric Ciphers and One-Way Hash Functions. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:83-89 [Conf]
  12. Jovan Dj. Golic
    On the Security of Shift Register Based Keystream Generators. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:90-100 [Conf]
  13. Cunsheng Ding
    The Differential Cryptanalysis and Design of Natural Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:101-115 [Conf]
  14. Eli Biham
    On Modes of Operation. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:116-120 [Conf]
  15. Dieter Gollmann
    Cryptanalysis of Clock Controlled Shift Registers. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:121-126 [Conf]
  16. David J. Wheeler
    A Bulk Data Encription Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:127-134 [Conf]
  17. Ren-ji Tao
    On Finite Automaton One-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:135-148 [Conf]
  18. Claus-Peter Schnorr, Serge Vaudenay
    Parallel FFT-Hashing. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:149-156 [Conf]
  19. Xuejia Lai, Lars R. Knudsen
    Attacks on Double Block Length Hash Functions. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:157-165 [Conf]
  20. Agnes Hui Chan, Richard A. Games, Joseph J. Rushanan
    On Quadratic M-Sequences. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:166-173 [Conf]
  21. Andrew Klapper, Mark Goresky
    2-Adic Shift Registers. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:174-178 [Conf]
  22. Kaisa Nyberg
    New Bent Mappings Suitable for Fast Implementation. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:179-184 [Conf]
  23. Nick MacLaren
    Cryptographic Pseudorandom Numbers in Simulation. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:185-190 [Conf]
  24. Bruce Schneier
    Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish). [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:191-204 [Conf]
  25. Adina di Porto, William Wolfowicz
    VINO: A Block Cipher Including Variable Permutations. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:205-210 [Conf]
  26. Lars R. Knudsen
    Practically Secure Feistel Cyphers. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:211-221 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002