The SCEAS System
Navigation Menu

Conferences in DBLP

Fast Software Encryption (FSE) (fse)
1999 (conf/fse/1999)

  1. Scott Contini, Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin
    Improved Analysis of Some Simplified Variants of RC6. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:1-15 [Conf]
  2. Johan Borst, Bart Preneel, Joos Vandewalle
    Linear Cryptanalysis of RC5 and RC6. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:16-30 [Conf]
  3. Chae Hoon Lim
    A Revised Version of Crypton - Crypton V1.0. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:31-45 [Conf]
  4. Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart Preneel
    Attack on Six Rounds of Crypton. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:46-59 [Conf]
  5. Stefan Lucks
    On Security of the 128-Bit Block Cipher DEAL. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:60-70 [Conf]
  6. Mitsuru Matsui, Toshio Tokita
    Cryptanalysis of a Reduced Version of the Block Cipher E2. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:71-80 [Conf]
  7. Lars R. Knudsen, Vincent Rijmen
    On the Decorrelated Fast Cipher (DFC) and Its Theory. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:81-94 [Conf]
  8. Markus Jakobsson, Julien P. Stern, Moti Yung
    Scramble All, Encrypt Small. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:95-111 [Conf]
  9. Stefan Lucks
    Accelerated Remotely Keyed Encruption. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:112-123 [Conf]
  10. Eli Biham, Alex Biryukov, Adi Shamir
    Miss in the Middle Attacks on IDEA and Khufu. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:124-138 [Conf]
  11. John Kelsey, Bruce Schneier, David Wagner
    Mod n Cryptanalysis, with Applications Against RC5P and M6. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:139-155 [Conf]
  12. David Wagner
    The Boomerang Attack. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:156-170 [Conf]
  13. Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram
    Towards Making Luby-Rackoff Ciphers Optimal and Practical. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:171-185 [Conf]
  14. Anne Canteaut, Pascale Charpin, Hans Dobbertin
    A New Characterization of Almost Bent Functions. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:186-200 [Conf]
  15. Kenneth G. Paterson
    Imprimitive Permutation Groups and Trapdoors in Iterated Block Ciphers. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:201-214 [Conf]
  16. Helena Handschuh, Bart Preneel
    On the Security of Double and 2-Key Triple Modes of Operation. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:215-230 [Conf]
  17. Mihir Bellare, Phillip Rogaway
    On the Construction of Variable-Input-Length Ciphers. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:231-244 [Conf]
  18. Alex Biryukov, David Wagner
    Slide Attacks. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:245-259 [Conf]
  19. Serge Vaudenay
    On the Security of CS-Cipher. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:260-274 [Conf]
  20. Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko
    Interpolation Attacks of the Block Cipher: SNAKE. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:275-289 [Conf]
  21. William Aiello, Sivaramakrishnan Rajagopalan, Ramarathnam Venkatesan
    High-Speed Pseudorandom Number Generation with Small Memory. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:290-304 [Conf]
  22. Daniel Bleichenbacher, Sarvar Patel
    SOBER Crytanalysis. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:305-316 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002