
Conferences in DBLP
 Alexander Klimov, Adi Shamir
New Cryptographic Primitives Based on Multiword TFunctions. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:115 [Conf]
 David Wagner
Towards a Unifying View of Block Cipher Cryptanalysis. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:1633 [Conf]
 Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon
Algebraic Attacks on Summation Generators. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:3448 [Conf]
 Joo Yeon Cho, Josef Pieprzyk
Algebraic Attacks on SOBERt32 and SOBERt16 without Stuttering. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:4964 [Conf]
 Frederik Armknecht
Improving Fast Algebraic Attacks. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:6582 [Conf]
 Jung Hee Cheon, Dong Hoon Lee
Resistance of SBoxes against Algebraic Attacks. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:8394 [Conf]
 Frédéric Muller
Differential Attacks against the Helix Stream Cipher. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:94108 [Conf]
 Håvard Molland
Improved Linear Consistency Attack on Irregular Clocked Keystream Generators. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:109126 [Conf]
 Håkan Englund, Martin Hell, Thomas Johansson
Correlation Attacks Using a New Class of Weak Feedback Polynomials. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:127142 [Conf]
 Soumen Maity, Subhamoy Maitra
Minimum Distance between Bent and 1Resilient Boolean Functions. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:143160 [Conf]
 Pantelimon Stanica, Subhamoy Maitra, John A. Clark
Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:161177 [Conf]
 Jovan Dj. Golic
A Weakness of the Linear Part of Stream Cipher MUGI. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:178192 [Conf]
 Jin Hong, Dong Hoon Lee, Seongtaek Chee, Palash Sarkar
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:193209 [Conf]
 Bartosz Zoltak
VMPC OneWay Function and Stream Cipher. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:210225 [Conf]
 Hongjun Wu
A New Stream Cipher HC256. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:226244 [Conf]
 Souradyuti Paul, Bart Preneel
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:245259 [Conf]
 Taizo Shirai, Kyoji Shibutani
Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:260278 [Conf]
 FrançoisXavier Standaert, Gilles Piret, Gaël Rouvroy, JeanJacques Quisquater, JeanDidier Legat
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:279299 [Conf]
 Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee, JuSung Kang
Related Key Differential Attacks on 27 Rounds of XTEA and FullRound GOST. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:299316 [Conf]
 Helger Lipmaa, Johan Wallén, Philippe Dumas
On the Additive Differential Probability of ExclusiveOr. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:317331 [Conf]
 MehdiLaurent Akkar, Régis Bevan, Louis Goubin
Two Power Analysis Attacks against OneMask Methods. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:332347 [Conf]
 Phillip Rogaway
NonceBased Symmetric Encryption. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:348359 [Conf]
 Stefan Lucks
Ciphers Secure against RelatedKey Attacks. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:359370 [Conf]
 Phillip Rogaway, Thomas Shrimpton
Cryptographic HashFunction Basics: Definitions, Implications, and Separations for Preimage Resistance, SecondPreimage Resistance, and Collision Resistance. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:371388 [Conf]
 Mihir Bellare, Phillip Rogaway, David Wagner
The EAX Mode of Operation. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:389407 [Conf]
 Tadayoshi Kohno, John Viega, Doug Whiting
CWC: A HighPerformance Conventional Authenticated Encryption Mode. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:408426 [Conf]
 Tetsu Iwata, Tadayoshi Kohno
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:427445 [Conf]
 Simon R. Blackburn, Kenneth G. Paterson
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:446453 [Conf]
 Scott Contini, Yiqun Lisa Yin
Fast SoftwareBased Attacks on SecurID. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:454471 [Conf]
 Dai Watanabe, Soichi Furuya
A MAC Forgery Attack on SOBER128. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:472482 [Conf]
 Alexander Maximov
On Linear Approximation of Modulo Sum. [Citation Graph (0, 0)][DBLP] FSE, 2004, pp:483484 [Conf]
