The SCEAS System
Navigation Menu

Conferences in DBLP

Fast Software Encryption (FSE) (fse)
2000 (conf/fse/2000)

  1. Alex Biryukov, Adi Shamir, David Wagner
    Real Time Cryptanalysis of A5/1 on a PC. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:1-18 [Conf]
  2. Scott R. Fluhrer, David A. McGrew
    Statistical Analysis of the Alleged RC4 Keystream Generator. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:19-30 [Conf]
  3. Muxiang Zhang, Christopher Carroll, Agnes Hui Chan
    The Software-Oriented Stream Cipher SSC2. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:31-48 [Conf]
  4. Paul Crowley
    Mercy: A Fast Large Block Cipher for Disk Sector Encryption. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:49-63 [Conf]
  5. Henri Gilbert, Helena Handschuh, Antoine Joux, Serge Vaudenay
    A Statistical Attack on RC6. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:64-74 [Conf]
  6. John Kelsey, Tadayoshi Kohno, Bruce Schneier
    Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:75-93 [Conf]
  7. Lars R. Knudsen, Willi Meier
    Correlations in RC6 with a Reduced Number of Rounds. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:94-108 [Conf]
  8. Amr M. Youssef, Guang Gong
    On the Interpolation Attacks on Block Ciphers. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:109-120 [Conf]
  9. Marine Minier, Henri Gilbert
    Stochastic Cryptanalysis of Crypton. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:121-133 [Conf]
  10. Joan Daemen, Michael Peeters, Gilles Van Assche
    Bitslice Ciphers and Power Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:134-149 [Conf]
  11. Thomas S. Messerges
    Securing the AES Finalists Against Power Analysis Attacks. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:150-164 [Conf]
  12. Anne Canteaut, Eric Filiol
    Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:165-180 [Conf]
  13. Vladimor V. Chepyzhov, Thomas Johansson, Ben J. M. Smeets
    A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:181-195 [Conf]
  14. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:196-212 [Conf]
  15. Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David Wagner, Doug Whiting
    Improved Cryptanalysis of Rijndael. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:213-230 [Conf]
  16. Tetsu Iwata, Kaoru Kurosawa
    On the Pseudorandomness of the AES Finalists - RC6 and Serpent. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:231-243 [Conf]
  17. Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle
    Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:244-261 [Conf]
  18. Lars R. Knudsen, John Erik Mathiassen
    A Chosen-Plaintext Linear Attack on DES. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:262-272 [Conf]
  19. Seokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Dong Hyeon Cheon, Inho Cho
    Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:273-283 [Conf]
  20. Jonathan Katz, Moti Yung
    Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:284-299 [Conf]
  21. L. Burnett, Gary Carter, Ed Dawson, William Millan
    Efficient Methods for Generating MARS-Like S-Boxes. [Citation Graph (0, 0)][DBLP]
    FSE, 2000, pp:300-314 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002