The SCEAS System
Navigation Menu

Conferences in DBLP

Fast Software Encryption (FSE) (fse)
1994 (conf/fse/1994)

  1. Bart Preneel
    FSE'94 - Introduction. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:1-5 [Conf]
  2. Ulrich Baum, Simon R. Blackburn
    Clock-Controlled Pseudorandom Generators on Finite Groups. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:6-21 [Conf]
  3. William G. Chambers
    On Random Mappings and Random Permutations. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:22-28 [Conf]
  4. Cunsheng Ding
    Binary Cyclotomic Generators. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:29-60 [Conf]
  5. Hans Dobbertin
    Construction of Bent Functions and Balanced Boolean Functions with High Nonlinearity. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:61-74 [Conf]
  6. Xuejia Lai
    Additive and Linear Structures of Cryptographic Functions. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:75-85 [Conf]
  7. Ronald L. Rivest
    The RC5 Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:86-96 [Conf]
  8. Matt Blaze, Bruce Schneier
    The MacGuffin Block Cipher Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:97-110 [Conf]
  9. Kaisa Nyberg
    S-boxes and Round Functions with Controllable Linearity and Differential Uniformity. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:111-130 [Conf]
  10. Luke O'Connor
    Properties of Linear Approximation Tables. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:131-136 [Conf]
  11. Ross J. Anderson
    Searching for the Optimum Correlation Attack. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:137-143 [Conf]
  12. Eli Biham, Paul C. Kocher
    A Known Plaintext Attack on the PKZIP Stream Cipher. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:144-153 [Conf]
  13. Jovan Dj. Golic
    Linear Cryptanalysis of Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:154-169 [Conf]
  14. Andrew Klapper
    Feedback with Carry Shift Registers over Finite Fields (extended abstract). [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:170-178 [Conf]
  15. David J. C. MacKay
    A Free Energy Minimization Framework for Inference Problems in modulo 2 Arithmetic. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:179-195 [Conf]
  16. Lars R. Knudsen
    Truncated and Higher Order Differentials. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:196-211 [Conf]
  17. James L. Massey
    SAFER K-64: One Year Later. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:212-241 [Conf]
  18. Vincent Rijmen, Bart Preneel
    Improved Characteristics for Differential Cryptanalysis of Hash Functions Based on Block Ciphers. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:242-248 [Conf]
  19. Burton S. Kaliski Jr., Matthew J. B. Robshaw
    Linear Cryptanalysis Using Multiple Approximations and FEAL. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:249-264 [Conf]
  20. Uwe Blöcher, Markus Dichtl
    Problems with the Linear Cryptanalysis of DES Using More Than One Active S-box per Round. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:265-274 [Conf]
  21. Joan Daemen, René Govaerts, Joos Vandewalle
    Correlation Matrices. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:275-285 [Conf]
  22. Serge Vaudenay
    On the Need for Multipermutations: Cryptanalysis of MD4 and SAFER. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:286-297 [Conf]
  23. Stefan Lucks
    How to Exploit the Intractability of Exact TSP for Cryptography. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:298-304 [Conf]
  24. Michael Roe
    How to Reverse Engineer an EES Device. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:305-328 [Conf]
  25. Walter T. Penzhorn
    A Fast Homomorphic Coding Algorithm Based on Arithmetic Coding. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:329-345 [Conf]
  26. Ross J. Anderson
    On Fibonacci Keystream Generators. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:346-352 [Conf]
  27. Vincent Rijmen, Bart Preneel
    Cryptanalysis of McGuffin. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:353-358 [Conf]
  28. Michael Roe
    Performance of Block Ciphers and Hash Functions - One Year Later. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:359-362 [Conf]
  29. David J. Wheeler, Roger M. Needham
    TEA, a Tiny Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:363-366 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002