|
Conferences in DBLP
- Stefan Lucks
The Saturation Attack - A Bait for Twofish. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:1-15 [Conf]
- Eli Biham, Orr Dunkelman, Nathan Keller
Linear Cryptanalysis of Reduced Round Serpent. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:16-27 [Conf]
- Scott R. Fluhrer
Cryptanalysis of the Mercy Block Cipher. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:28-36 [Conf]
- Vincent Rijmen, Bart Van Rompay, Bart Preneel, Joos Vandewalle
Producing Collisions for PANAMA. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:37-51 [Conf]
- Christophe Debaert, Henri Gilbert
The RIPEMD and RIPEMD Improved Variants of MD4 Are Not Collision Free. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:52-65 [Conf]
- Yuriy Tarannikov
New Constructions of Resilient Boolean Functions with Maximal Nonlinearity. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:66-77 [Conf]
- Ammar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi
Optimized Self-Synchronizing Mode of Operation. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:78-91 [Conf]
- Virgil D. Gligor, Pompiliu Donescu
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:92-108 [Conf]
- Enrico Buonanno, Jonathan Katz, Moti Yung
Incremental Unforgeable Encryption. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:109-124 [Conf]
- Michael Stay
ZIP Attacks with Reduced Known Plaintext. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:125-134 [Conf]
- Scott R. Fluhrer
Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:135-143 [Conf]
- Goce Jakimovski, Ljupco Kocarev
Cryptanalysis of SBLH. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:144-151 [Conf]
- Itsik Mantin, Adi Shamir
A Practical Attack on Broadcast RC4. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:152-164 [Conf]
- Paulo S. L. M. Barreto, Vincent Rijmen, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle, Hae Yong Kim
Improved SQUARE Attacks against Reduced-Round HIEROCRYPT. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:165-173 [Conf]
- Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen
Differential Cryptanalysis of Q. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:174-186 [Conf]
- Vladimir Furman
Differential Cryptanalysis of Nimbus. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:187-195 [Conf]
- Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
Fast Correlation Attack Algorithm with List Decoding and an Application. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:196-210 [Conf]
- Paul Crowley, Stefan Lucks
Bias in the LEVIATHAN Stream Cipher. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:211-218 [Conf]
- Daniel Bleichenbacher, Willi Meier
Analysis of SSC2. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:219-232 [Conf]
- Tetsu Iwata, Tomonobu Yoshino, Tomohiro Yuasa, Kaoru Kurosawa
Round Security and Super-Pseudorandomness of MISTY Type Structure. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:233-247 [Conf]
- Henri Gilbert, Marine Minier
New Results on the Pseudorandomness of Some Blockcipher Constructions. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:248-266 [Conf]
- Bart Preneel
NESSIE: A European Approach to Evaluate Cryptographic Algorithms. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:267-276 [Conf]
- Mark Blunden, Adrian Escott
Related Key Attacks on Reduced Round KASUMI. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:277-285 [Conf]
- Masayuki Kanda, Tsutomu Matsumoto
Security of Camellia against Truncated Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:286-299 [Conf]
- Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim
Impossible Differential Cryptanalysis of Zodiac. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:300-311 [Conf]
- Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii, Hidema Tanaka
The Block Cipher SC2000. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:312-327 [Conf]
- Louis Granboulan
Flaws in Differential Cryptanalysis of Skipjack. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:328-335 [Conf]
- Helger Lipmaa, Shiho Moriai
Efficient Algorithms for Computing Differential Properties of Addition. [Citation Graph (0, 0)][DBLP] FSE, 2001, pp:336-350 [Conf]
|