Conferences in DBLP
Ali Aydin Selçuk New Results in Linear Cryptanalysis of RC5. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:1-16 [Conf ] Shiho Moriai , Takeshi Shimoyama , Toshinobu Kaneko Higher Order Differential Attak of CAST Cipher. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:17-31 [Conf ] Don Coppersmith , David Wagner , Bruce Schneier , John Kelsey Cryptanalysis of TWOPRIME. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:32-48 [Conf ] Hervé Chabanne , Emmanuel Michon JEROBOAM. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:49-59 [Conf ] Joan Daemen , Craig S. K. Clapp Fast Hashing and Stream Encryption with PANAMA. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:60-74 [Conf ] Craig S. K. Clapp Joint Hardware / Software Design of a Fast Stream Cipher. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:75-92 [Conf ] Kanat S. Abdukhalikov , Chul Kim On the Security of the Hashing Scheme Based on SL2 . [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:93-102 [Conf ] Jacques Patarin About Feistel Schemes with Six (or More) Rounds. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:103-121 [Conf ] Adam Young , Moti Yung Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:122-133 [Conf ] Reihaneh Safavi-Naini , Shahram Bakhtiari , Chris Charnes MRD Hashing. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:134-149 [Conf ] William Aiello , Stuart Haber , Ramarathnam Venkatesan New Constructions for Secure Hash Functions. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:150-167 [Conf ] John Kelsey , Bruce Schneier , David Wagner , Chris Hall Cryptanalytic Attacks on Pseudorandom Number Generators. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:168-188 [Conf ] Jacques Stern , Serge Vaudenay CS-Cipher. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:189-205 [Conf ] Lars R. Knudsen , Vincent Rijmen , Ronald L. Rivest , Matthew J. B. Robshaw On the Design and Security of RC2. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:206-221 [Conf ] Eli Biham , Ross J. Anderson , Lars R. Knudsen Serpent: A New Block Cipher Proposal. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:222-238 [Conf ] Stefan Lucks Attacking Triple Encryption. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:239-253 [Conf ] David Wagner Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:254-269 [Conf ] Bart Van Rompay , Lars R. Knudsen , Vincent Rijmen Differential Cryptanalysis of the ICE Encryption Algorithm. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:270-283 [Conf ] Hans Dobbertin The First Two Rounds of MD4 are Not One-Way. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:284-292 [Conf ] David Wagner Differential Cryptanalysis of KHF. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1998, pp:293-296 [Conf ]