Conferences in DBLP
Scott Contini , Ronald L. Rivest , Matthew J. B. Robshaw , Yiqun Lisa Yin Improved Analysis of Some Simplified Variants of RC6. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:1-15 [Conf ] Johan Borst , Bart Preneel , Joos Vandewalle Linear Cryptanalysis of RC5 and RC6. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:16-30 [Conf ] Chae Hoon Lim A Revised Version of Crypton - Crypton V1.0. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:31-45 [Conf ] Carl D'Halluin , Gert Bijnens , Vincent Rijmen , Bart Preneel Attack on Six Rounds of Crypton. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:46-59 [Conf ] Stefan Lucks On Security of the 128-Bit Block Cipher DEAL. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:60-70 [Conf ] Mitsuru Matsui , Toshio Tokita Cryptanalysis of a Reduced Version of the Block Cipher E2. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:71-80 [Conf ] Lars R. Knudsen , Vincent Rijmen On the Decorrelated Fast Cipher (DFC) and Its Theory. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:81-94 [Conf ] Markus Jakobsson , Julien P. Stern , Moti Yung Scramble All, Encrypt Small. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:95-111 [Conf ] Stefan Lucks Accelerated Remotely Keyed Encruption. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:112-123 [Conf ] Eli Biham , Alex Biryukov , Adi Shamir Miss in the Middle Attacks on IDEA and Khufu. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:124-138 [Conf ] John Kelsey , Bruce Schneier , David Wagner Mod n Cryptanalysis, with Applications Against RC5P and M6. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:139-155 [Conf ] David Wagner The Boomerang Attack. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:156-170 [Conf ] Sarvar Patel , Zulfikar Ramzan , Ganapathy S. Sundaram Towards Making Luby-Rackoff Ciphers Optimal and Practical. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:171-185 [Conf ] Anne Canteaut , Pascale Charpin , Hans Dobbertin A New Characterization of Almost Bent Functions. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:186-200 [Conf ] Kenneth G. Paterson Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:201-214 [Conf ] Helena Handschuh , Bart Preneel On the Security of Double and 2-Key Triple Modes of Operation. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:215-230 [Conf ] Mihir Bellare , Phillip Rogaway On the Construction of Variable-Input-Length Ciphers. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:231-244 [Conf ] Alex Biryukov , David Wagner Slide Attacks. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:245-259 [Conf ] Serge Vaudenay On the Security of CS-Cipher. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:260-274 [Conf ] Shiho Moriai , Takeshi Shimoyama , Toshinobu Kaneko Interpolation Attacks of the Block Cipher: SNAKE. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:275-289 [Conf ] William Aiello , Sivaramakrishnan Rajagopalan , Ramarathnam Venkatesan High-Speed Pseudorandom Number Generation with Small Memory. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:290-304 [Conf ] Daniel Bleichenbacher , Sarvar Patel SOBER Crytanalysis. [Citation Graph (0, 0)][DBLP ] Fast Software Encryption, 1999, pp:305-316 [Conf ]