Conferences in DBLP
Xuejia Lai , Rainer A. Rueppel Attacks on the HKM/HFX Cryptosystem. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:1-14 [Conf ] Lars R. Knudsen , Thomas A. Berson Truncated Differentials of SAFER. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:15-26 [Conf ] Serge Vaudenay On the Weak Keys of Blowfish. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:27-32 [Conf ] Matt Blaze High-Bandwidth Encryption with Low-Bandwidth Smartcards. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:33-40 [Conf ] Robert J. Jenkins Jr. ISAAC. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:41-49 [Conf ] Willi Geiselmann A Note on the Hash Function of Tillich and Zémor. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:51-52 [Conf ] Hans Dobbertin Cryptanalysis of MD4. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:53-69 [Conf ] Hans Dobbertin , Antoon Bosselaers , Bart Preneel RIPEMD-160: A Strengthened Version of RIPEMD. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:71-82 [Conf ] Kaisa Nyberg Fast Accumulated Hashing. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:83-87 [Conf ] Ross J. Anderson , Eli Biham TIGER: A Fast New Hash Function. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:89-97 [Conf ] Vincent Rijmen , Joan Daemen , Bart Preneel , Antoon Bosselaers , Erik De Win The Cipher SHARK. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:99-111 [Conf ] Ross J. Anderson , Eli Biham Two Practical and Provably Secure Block Ciphers: BEARS and LION. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:113-120 [Conf ] Bruce Schneier , John Kelsey Unbalanced Feistel Networks and Block Cipher Design. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:121-144 [Conf ] Andrew Clark , Jovan Dj. Golic , Ed Dawson A Comparison of Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:145-157 [Conf ] Walter T. Penzhorn Correlation Attacks on Stream Ciphers: Computing Low-Weight Parity Checks Based on Error-Correcting Codes. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:159-172 [Conf ] Jovan Dj. Golic On the Security of Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:173-188 [Conf ] Stefan Lucks Faster Luby-Rackoff Ciphers. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:189-203 [Conf ] Mitsuru Matsui New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1996, pp:205-218 [Conf ]