The SCEAS System
Navigation Menu

Conferences in DBLP

Fast Software Encryption (FSE) (fse)
2004 (conf/fse/2004)

  1. Alexander Klimov, Adi Shamir
    New Cryptographic Primitives Based on Multiword T-Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:1-15 [Conf]
  2. David Wagner
    Towards a Unifying View of Block Cipher Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:16-33 [Conf]
  3. Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon
    Algebraic Attacks on Summation Generators. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:34-48 [Conf]
  4. Joo Yeon Cho, Josef Pieprzyk
    Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:49-64 [Conf]
  5. Frederik Armknecht
    Improving Fast Algebraic Attacks. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:65-82 [Conf]
  6. Jung Hee Cheon, Dong Hoon Lee
    Resistance of S-Boxes against Algebraic Attacks. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:83-94 [Conf]
  7. Frédéric Muller
    Differential Attacks against the Helix Stream Cipher. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:94-108 [Conf]
  8. Håvard Molland
    Improved Linear Consistency Attack on Irregular Clocked Keystream Generators. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:109-126 [Conf]
  9. Håkan Englund, Martin Hell, Thomas Johansson
    Correlation Attacks Using a New Class of Weak Feedback Polynomials. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:127-142 [Conf]
  10. Soumen Maity, Subhamoy Maitra
    Minimum Distance between Bent and 1-Resilient Boolean Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:143-160 [Conf]
  11. Pantelimon Stanica, Subhamoy Maitra, John A. Clark
    Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:161-177 [Conf]
  12. Jovan Dj. Golic
    A Weakness of the Linear Part of Stream Cipher MUGI. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:178-192 [Conf]
  13. Jin Hong, Dong Hoon Lee, Seongtaek Chee, Palash Sarkar
    Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:193-209 [Conf]
  14. Bartosz Zoltak
    VMPC One-Way Function and Stream Cipher. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:210-225 [Conf]
  15. Hongjun Wu
    A New Stream Cipher HC-256. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:226-244 [Conf]
  16. Souradyuti Paul, Bart Preneel
    A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:245-259 [Conf]
  17. Taizo Shirai, Kyoji Shibutani
    Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:260-278 [Conf]
  18. François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat
    ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:279-299 [Conf]
  19. Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee, Ju-Sung Kang
    Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:299-316 [Conf]
  20. Helger Lipmaa, Johan Wallén, Philippe Dumas
    On the Additive Differential Probability of Exclusive-Or. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:317-331 [Conf]
  21. Mehdi-Laurent Akkar, Régis Bevan, Louis Goubin
    Two Power Analysis Attacks against One-Mask Methods. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:332-347 [Conf]
  22. Phillip Rogaway
    Nonce-Based Symmetric Encryption. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:348-359 [Conf]
  23. Stefan Lucks
    Ciphers Secure against Related-Key Attacks. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:359-370 [Conf]
  24. Phillip Rogaway, Thomas Shrimpton
    Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:371-388 [Conf]
  25. Mihir Bellare, Phillip Rogaway, David Wagner
    The EAX Mode of Operation. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:389-407 [Conf]
  26. Tadayoshi Kohno, John Viega, Doug Whiting
    CWC: A High-Performance Conventional Authenticated Encryption Mode. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:408-426 [Conf]
  27. Tetsu Iwata, Tadayoshi Kohno
    New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:427-445 [Conf]
  28. Simon R. Blackburn, Kenneth G. Paterson
    Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:446-453 [Conf]
  29. Scott Contini, Yiqun Lisa Yin
    Fast Software-Based Attacks on SecurID. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:454-471 [Conf]
  30. Dai Watanabe, Soichi Furuya
    A MAC Forgery Attack on SOBER-128. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:472-482 [Conf]
  31. Alexander Maximov
    On Linear Approximation of Modulo Sum. [Citation Graph (0, 0)][DBLP]
    FSE, 2004, pp:483-484 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002