|
Conferences in DBLP
- Alex Biryukov, Adi Shamir, David Wagner
Real Time Cryptanalysis of A5/1 on a PC. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:1-18 [Conf]
- Scott R. Fluhrer, David A. McGrew
Statistical Analysis of the Alleged RC4 Keystream Generator. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:19-30 [Conf]
- Muxiang Zhang, Christopher Carroll, Agnes Hui Chan
The Software-Oriented Stream Cipher SSC2. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:31-48 [Conf]
- Paul Crowley
Mercy: A Fast Large Block Cipher for Disk Sector Encryption. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:49-63 [Conf]
- Henri Gilbert, Helena Handschuh, Antoine Joux, Serge Vaudenay
A Statistical Attack on RC6. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:64-74 [Conf]
- John Kelsey, Tadayoshi Kohno, Bruce Schneier
Amplified Boomerang Attacks Against Reduced-Round MARS and Serpent. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:75-93 [Conf]
- Lars R. Knudsen, Willi Meier
Correlations in RC6 with a Reduced Number of Rounds. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:94-108 [Conf]
- Amr M. Youssef, Guang Gong
On the Interpolation Attacks on Block Ciphers. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:109-120 [Conf]
- Marine Minier, Henri Gilbert
Stochastic Cryptanalysis of Crypton. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:121-133 [Conf]
- Joan Daemen, Michael Peeters, Gilles Van Assche
Bitslice Ciphers and Power Analysis Attacks. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:134-149 [Conf]
- Thomas S. Messerges
Securing the AES Finalists Against Power Analysis Attacks. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:150-164 [Conf]
- Anne Canteaut, Eric Filiol
Ciphertext Only Reconstruction of Stream Ciphers Based on Combination Generators. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:165-180 [Conf]
- Vladimor V. Chepyzhov, Thomas Johansson, Ben J. M. Smeets
A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:181-195 [Conf]
- Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:196-212 [Conf]
- Niels Ferguson, John Kelsey, Stefan Lucks, Bruce Schneier, Michael Stay, David Wagner, Doug Whiting
Improved Cryptanalysis of Rijndael. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:213-230 [Conf]
- Tetsu Iwata, Kaoru Kurosawa
On the Pseudorandomness of the AES Finalists - RC6 and Serpent. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:231-243 [Conf]
- Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle
Linear Cryptanalysis of Reduced-Round Versions of the SAFER Block Cipher Family. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:244-261 [Conf]
- Lars R. Knudsen, John Erik Mathiassen
A Chosen-Plaintext Linear Attack on DES. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:262-272 [Conf]
- Seokhie Hong, Sangjin Lee, Jongin Lim, Jaechul Sung, Dong Hyeon Cheon, Inho Cho
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:273-283 [Conf]
- Jonathan Katz, Moti Yung
Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:284-299 [Conf]
- L. Burnett, Gary Carter, Ed Dawson, William Millan
Efficient Methods for Generating MARS-Like S-Boxes. [Citation Graph (0, 0)][DBLP] FSE, 2000, pp:300-314 [Conf]
|