|
Conferences in DBLP
- Alexander Klimov, Adi Shamir
New Cryptographic Primitives Based on Multiword T-Functions. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:1-15 [Conf]
- David Wagner
Towards a Unifying View of Block Cipher Cryptanalysis. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:16-33 [Conf]
- Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon
Algebraic Attacks on Summation Generators. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:34-48 [Conf]
- Joo Yeon Cho, Josef Pieprzyk
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:49-64 [Conf]
- Frederik Armknecht
Improving Fast Algebraic Attacks. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:65-82 [Conf]
- Jung Hee Cheon, Dong Hoon Lee
Resistance of S-Boxes against Algebraic Attacks. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:83-94 [Conf]
- Frédéric Muller
Differential Attacks against the Helix Stream Cipher. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:94-108 [Conf]
- Håvard Molland
Improved Linear Consistency Attack on Irregular Clocked Keystream Generators. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:109-126 [Conf]
- Håkan Englund, Martin Hell, Thomas Johansson
Correlation Attacks Using a New Class of Weak Feedback Polynomials. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:127-142 [Conf]
- Soumen Maity, Subhamoy Maitra
Minimum Distance between Bent and 1-Resilient Boolean Functions. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:143-160 [Conf]
- Pantelimon Stanica, Subhamoy Maitra, John A. Clark
Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:161-177 [Conf]
- Jovan Dj. Golic
A Weakness of the Linear Part of Stream Cipher MUGI. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:178-192 [Conf]
- Jin Hong, Dong Hoon Lee, Seongtaek Chee, Palash Sarkar
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:193-209 [Conf]
- Bartosz Zoltak
VMPC One-Way Function and Stream Cipher. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:210-225 [Conf]
- Hongjun Wu
A New Stream Cipher HC-256. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:226-244 [Conf]
- Souradyuti Paul, Bart Preneel
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:245-259 [Conf]
- Taizo Shirai, Kyoji Shibutani
Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:260-278 [Conf]
- François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:279-299 [Conf]
- Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee, Ju-Sung Kang
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:299-316 [Conf]
- Helger Lipmaa, Johan Wallén, Philippe Dumas
On the Additive Differential Probability of Exclusive-Or. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:317-331 [Conf]
- Mehdi-Laurent Akkar, Régis Bevan, Louis Goubin
Two Power Analysis Attacks against One-Mask Methods. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:332-347 [Conf]
- Phillip Rogaway
Nonce-Based Symmetric Encryption. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:348-359 [Conf]
- Stefan Lucks
Ciphers Secure against Related-Key Attacks. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:359-370 [Conf]
- Phillip Rogaway, Thomas Shrimpton
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:371-388 [Conf]
- Mihir Bellare, Phillip Rogaway, David Wagner
The EAX Mode of Operation. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:389-407 [Conf]
- Tadayoshi Kohno, John Viega, Doug Whiting
CWC: A High-Performance Conventional Authenticated Encryption Mode. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:408-426 [Conf]
- Tetsu Iwata, Tadayoshi Kohno
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:427-445 [Conf]
- Simon R. Blackburn, Kenneth G. Paterson
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:446-453 [Conf]
- Scott Contini, Yiqun Lisa Yin
Fast Software-Based Attacks on SecurID. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:454-471 [Conf]
- Dai Watanabe, Soichi Furuya
A MAC Forgery Attack on SOBER-128. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:472-482 [Conf]
- Alexander Maximov
On Linear Approximation of Modulo Sum. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:483-484 [Conf]
|