The SCEAS System
Navigation Menu

Conferences in DBLP

Fast Software Encryption (FSE) (fse)
1998 (conf/fse/1998)

  1. Ali Aydin Selçuk
    New Results in Linear Cryptanalysis of RC5. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:1-16 [Conf]
  2. Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko
    Higher Order Differential Attak of CAST Cipher. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:17-31 [Conf]
  3. Don Coppersmith, David Wagner, Bruce Schneier, John Kelsey
    Cryptanalysis of TWOPRIME. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:32-48 [Conf]
  4. Hervé Chabanne, Emmanuel Michon
    JEROBOAM. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:49-59 [Conf]
  5. Joan Daemen, Craig S. K. Clapp
    Fast Hashing and Stream Encryption with PANAMA. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:60-74 [Conf]
  6. Craig S. K. Clapp
    Joint Hardware / Software Design of a Fast Stream Cipher. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:75-92 [Conf]
  7. Kanat S. Abdukhalikov, Chul Kim
    On the Security of the Hashing Scheme Based on SL2. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:93-102 [Conf]
  8. Jacques Patarin
    About Feistel Schemes with Six (or More) Rounds. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:103-121 [Conf]
  9. Adam Young, Moti Yung
    Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:122-133 [Conf]
  10. Reihaneh Safavi-Naini, Shahram Bakhtiari, Chris Charnes
    MRD Hashing. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:134-149 [Conf]
  11. William Aiello, Stuart Haber, Ramarathnam Venkatesan
    New Constructions for Secure Hash Functions. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:150-167 [Conf]
  12. John Kelsey, Bruce Schneier, David Wagner, Chris Hall
    Cryptanalytic Attacks on Pseudorandom Number Generators. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:168-188 [Conf]
  13. Jacques Stern, Serge Vaudenay
    CS-Cipher. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:189-205 [Conf]
  14. Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw
    On the Design and Security of RC2. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:206-221 [Conf]
  15. Eli Biham, Ross J. Anderson, Lars R. Knudsen
    Serpent: A New Block Cipher Proposal. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:222-238 [Conf]
  16. Stefan Lucks
    Attacking Triple Encryption. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:239-253 [Conf]
  17. David Wagner
    Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:254-269 [Conf]
  18. Bart Van Rompay, Lars R. Knudsen, Vincent Rijmen
    Differential Cryptanalysis of the ICE Encryption Algorithm. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:270-283 [Conf]
  19. Hans Dobbertin
    The First Two Rounds of MD4 are Not One-Way. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:284-292 [Conf]
  20. David Wagner
    Differential Cryptanalysis of KHF. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:293-296 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002