The SCEAS System
Navigation Menu

Conferences in DBLP

Fast Software Encryption (FSE) (fse)
1996 (conf/fse/1996)

  1. Xuejia Lai, Rainer A. Rueppel
    Attacks on the HKM/HFX Cryptosystem. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:1-14 [Conf]
  2. Lars R. Knudsen, Thomas A. Berson
    Truncated Differentials of SAFER. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:15-26 [Conf]
  3. Serge Vaudenay
    On the Weak Keys of Blowfish. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:27-32 [Conf]
  4. Matt Blaze
    High-Bandwidth Encryption with Low-Bandwidth Smartcards. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:33-40 [Conf]
  5. Robert J. Jenkins Jr.
    ISAAC. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:41-49 [Conf]
  6. Willi Geiselmann
    A Note on the Hash Function of Tillich and Zémor. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:51-52 [Conf]
  7. Hans Dobbertin
    Cryptanalysis of MD4. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:53-69 [Conf]
  8. Hans Dobbertin, Antoon Bosselaers, Bart Preneel
    RIPEMD-160: A Strengthened Version of RIPEMD. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:71-82 [Conf]
  9. Kaisa Nyberg
    Fast Accumulated Hashing. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:83-87 [Conf]
  10. Ross J. Anderson, Eli Biham
    TIGER: A Fast New Hash Function. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:89-97 [Conf]
  11. Vincent Rijmen, Joan Daemen, Bart Preneel, Antoon Bosselaers, Erik De Win
    The Cipher SHARK. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:99-111 [Conf]
  12. Ross J. Anderson, Eli Biham
    Two Practical and Provably Secure Block Ciphers: BEARS and LION. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:113-120 [Conf]
  13. Bruce Schneier, John Kelsey
    Unbalanced Feistel Networks and Block Cipher Design. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:121-144 [Conf]
  14. Andrew Clark, Jovan Dj. Golic, Ed Dawson
    A Comparison of Fast Correlation Attacks. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:145-157 [Conf]
  15. Walter T. Penzhorn
    Correlation Attacks on Stream Ciphers: Computing Low-Weight Parity Checks Based on Error-Correcting Codes. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:159-172 [Conf]
  16. Jovan Dj. Golic
    On the Security of Nonlinear Filter Generators. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:173-188 [Conf]
  17. Stefan Lucks
    Faster Luby-Rackoff Ciphers. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:189-203 [Conf]
  18. Mitsuru Matsui
    New Structure of Block Ciphers with Provable Security against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1996, pp:205-218 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002