|
Conferences in DBLP
- Håvard Raddum
Cryptanalysis of IDEA-X/2. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:1-8 [Conf]
- Eli Biham, Orr Dunkelman, Nathan Keller
Differential-Linear Cryptanalysis of Serpent. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:9-21 [Conf]
- Eli Biham, Orr Dunkelman, Nathan Keller
Rectangle Attacks on 49-Round SHACAL-1. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:22-35 [Conf]
- Markku-Juhani Olavi Saarinen
Cryptanalysis of Block Ciphers Based on SHA-1 and MD5. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:36-44 [Conf]
- Alex Biryukov
Analysis of Involutional Ciphers: Khazad and Anubis. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:45-53 [Conf]
- Claude Carlet, Emmanuel Prouff
On Plateaued Functions and Their Constructions. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:54-73 [Conf]
- Joanne Fuller, William Millan
Linear Redundancy in S-Boxes. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:74-86 [Conf]
- Antoine Joux, Frédéric Muller
Loosening the KNOT. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:87-99 [Conf]
- Jovan Dj. Golic, Guglielmo Morgari
On the Resynchronization Attack. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:100-110 [Conf]
- Steve Babbage, Christophe De Cannière, Joseph Lano, Bart Preneel, Joos Vandewalle
Cryptanalysis of SOBER-t32. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:111-128 [Conf]
- Tetsu Iwata, Kaoru Kurosawa
OMAC: One-Key CBC MAC. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:129-153 [Conf]
- Dowon Hong, Ju-Sung Kang, Bart Preneel, Heuisu Ryu
A Concrete Security Analysis for 3GPP-MAC. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:154-169 [Conf]
- Antoine Joux, Guillaume Poupard, Jacques Stern
New Attacks against Standardized MACs. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:170-181 [Conf]
- Lars R. Knudsen, Tadayoshi Kohno
Analysis of RMAC. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:182-191 [Conf]
- Mehdi-Laurent Akkar, Louis Goubin
A Generic Protection against High-Order Differential Power Analysis. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:192-205 [Conf]
- Kai Schramm, Thomas J. Wollinger, Christof Paar
A New Class of Collision Attacks and Its Application to DES. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:206-222 [Conf]
- Beomsik Song, Jennifer Seberry
Further Observations on the Structure of the AES Algorithm. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:223-234 [Conf]
- Pascal Junod, Serge Vaudenay
Optimal Key Ranking Procedures in a Statistical Cryptanalysis. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:235-246 [Conf]
- Sangwoo Park, Soo Hak Sung, Sangjin Lee, Jongin Lim
Improving the Upper Bound on the Maximum Differential and the Maximum Linear Hull Probability for SPN Structures and AES. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:247-260 [Conf]
- Johan Wallén
Linear Approximations of Addition Modulo 2n. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:261-273 [Conf]
- Alex Biryukov, Christophe De Cannière
Block Ciphers and Systems of Quadratic Equations. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:274-289 [Conf]
- Gregory G. Rose, Philip Hawkes
Turing: A Fast Stream Cipher. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:290-306 [Conf]
- Martin Boesgaard, Mette Vesterager, Thomas Pedersen, Jesper Christiansen, Ove Scavenius
Rabbit: A New High-Performance Stream Cipher. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:307-329 [Conf]
- Niels Ferguson, Doug Whiting, Bruce Schneier, John Kelsey, Stefan Lucks, Tadayoshi Kohno
Helix: Fast Encryption and Authentication in a Single Cryptographic Primitive. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:330-346 [Conf]
- Pinakpani Pal, Palash Sarkar
PARSHA-256- - A New Parallelizable Hash Function and a Multithreaded Implementation. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:347-361 [Conf]
- Pierre-Alain Fouque, Gwenaëlle Martinet, Guillaume Poupard
Practical Symmetric On-Line Encryption. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:362-375 [Conf]
- Henri Gilbert
The Security of "One-Block-to-Many" Modes of Operation. [Citation Graph (0, 0)][DBLP] FSE, 2003, pp:376-395 [Conf]
|