The SCEAS System
Navigation Menu

Conferences in DBLP

Fast Software Encryption (FSE) (fse)
2005 (conf/fse/2005)

  1. Joan Daemen, Vincent Rijmen
    A New MAC Construction ALRED and a Specific Instance ALPHA-MAC. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:1-17 [Conf]
  2. Alexander Klimov, Adi Shamir
    New Applications of T-Functions in Block Ciphers and Hash Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:18-31 [Conf]
  3. Daniel J. Bernstein
    The Poly1305-AES Message-Authentication Code. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:32-49 [Conf]
  4. Magnus Daum
    Narrow T-Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:50-67 [Conf]
  5. Jin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han
    A New Class of Single Cycle T-Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:68-82 [Conf]
  6. François Arnault, Thierry P. Berger
    F-FCSR: Design of a New Class of Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:83-97 [Conf]
  7. Deepak Kumar Dalai, Kishan Chand Gupta, Subhamoy Maitra
    Cryptographically Significant Boolean Functions: Construction and Analysis in Terms of Algebraic Immunity. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:98-111 [Conf]
  8. An Braeken, Igor Semaev
    The ANF of the Composition of Addition and Multiplication mod 2n with a Boolean Function. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:112-125 [Conf]
  9. Eli Biham, Orr Dunkelman, Nathan Keller
    New Combined Attacks on Block Ciphers. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:126-144 [Conf]
  10. Carlos Cid, Sean Murphy, Matthew J. B. Robshaw
    Small Scale Variants of the AES. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:145-162 [Conf]
  11. Smile Markovski, Danilo Gligoroski, Ljupco Kocarev
    Unbiased Random Sequences from Quasigroup String Transformations. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:163-180 [Conf]
  12. Håkan Englund, Thomas Johansson
    A New Distinguisher for Clock Controlled Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:181-195 [Conf]
  13. Aline Gouget, Hervé Sibert, Côme Berbain, Nicolas Courtois, Blandine Debraize, Chris J. Mitchell
    Analysis of the Bit-Search Generator and Sequence Compression Techniques. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:196-214 [Conf]
  14. Martin Hell, Thomas Johansson
    Some Attacks on the Bit-Search Generator. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:215-227 [Conf]
  15. Lars R. Knudsen
    SMASH - A Cryptographic Hash Function. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:228-242 [Conf]
  16. Mridul Nandi, Wonil Lee, Kouichi Sakurai, Sangjin Lee
    Security Analysis of a 2/3-Rate Double Length Compression Function in the Black-Box Model. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:243-254 [Conf]
  17. Lars R. Knudsen, John Erik Mathiassen
    Preimage and Collision Attacks on MD2. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:255-267 [Conf]
  18. Tetsu Iwata, Kaoru Kurosawa
    How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:268-283 [Conf]
  19. Stefan Lucks
    Two-Pass Authenticated Encryption Faster Than Generic Composition. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:284-298 [Conf]
  20. Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell
    Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:299-319 [Conf]
  21. Alex Biryukov, Adi Shamir
    Analysis of the Non-linear Part of Mugi. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:320-329 [Conf]
  22. Antoine Joux, Frédéric Muller
    Two Attacks Against the HBB Stream Cipher. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:330-341 [Conf]
  23. Alexander Maximov
    Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of RC4 Family of Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:342-358 [Conf]
  24. Eli Biham, Louis Granboulan, Phong Q. Nguyen
    Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:359-367 [Conf]
  25. Seokhie Hong, Jongsung Kim, Sangjin Lee, Bart Preneel
    Related-Key Rectangle Attacks on Reduced Versions of SHACAL-1 and AES-192. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:368-383 [Conf]
  26. Pascal Junod
    New Attacks Against Reduced-Round Versions of IDEA. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:384-397 [Conf]
  27. Mitsuru Matsui, Sayaka Fukuda
    How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4 Processors. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:398-412 [Conf]
  28. Elisabeth Oswald, Stefan Mangard, Norbert Pramstaller, Vincent Rijmen
    A Side-Channel Analysis Resistant Description of the AES S-Box. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:413-423 [Conf]
  29. Emmanuel Prouff
    DPA Attacks and S-Boxes. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:424-441 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002