The SCEAS System
Navigation Menu

Conferences in DBLP

Fast Software Encryption (FSE) (fse)
2001 (conf/fse/2001)

  1. Stefan Lucks
    The Saturation Attack - A Bait for Twofish. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:1-15 [Conf]
  2. Eli Biham, Orr Dunkelman, Nathan Keller
    Linear Cryptanalysis of Reduced Round Serpent. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:16-27 [Conf]
  3. Scott R. Fluhrer
    Cryptanalysis of the Mercy Block Cipher. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:28-36 [Conf]
  4. Vincent Rijmen, Bart Van Rompay, Bart Preneel, Joos Vandewalle
    Producing Collisions for PANAMA. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:37-51 [Conf]
  5. Christophe Debaert, Henri Gilbert
    The RIPEMD and RIPEMD Improved Variants of MD4 Are Not Collision Free. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:52-65 [Conf]
  6. Yuriy Tarannikov
    New Constructions of Resilient Boolean Functions with Maximal Nonlinearity. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:66-77 [Conf]
  7. Ammar Alkassar, Alexander Geraldy, Birgit Pfitzmann, Ahmad-Reza Sadeghi
    Optimized Self-Synchronizing Mode of Operation. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:78-91 [Conf]
  8. Virgil D. Gligor, Pompiliu Donescu
    Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:92-108 [Conf]
  9. Enrico Buonanno, Jonathan Katz, Moti Yung
    Incremental Unforgeable Encryption. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:109-124 [Conf]
  10. Michael Stay
    ZIP Attacks with Reduced Known Plaintext. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:125-134 [Conf]
  11. Scott R. Fluhrer
    Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:135-143 [Conf]
  12. Goce Jakimovski, Ljupco Kocarev
    Cryptanalysis of SBLH. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:144-151 [Conf]
  13. Itsik Mantin, Adi Shamir
    A Practical Attack on Broadcast RC4. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:152-164 [Conf]
  14. Paulo S. L. M. Barreto, Vincent Rijmen, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle, Hae Yong Kim
    Improved SQUARE Attacks against Reduced-Round HIEROCRYPT. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:165-173 [Conf]
  15. Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen
    Differential Cryptanalysis of Q. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:174-186 [Conf]
  16. Vladimir Furman
    Differential Cryptanalysis of Nimbus. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:187-195 [Conf]
  17. Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai
    Fast Correlation Attack Algorithm with List Decoding and an Application. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:196-210 [Conf]
  18. Paul Crowley, Stefan Lucks
    Bias in the LEVIATHAN Stream Cipher. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:211-218 [Conf]
  19. Daniel Bleichenbacher, Willi Meier
    Analysis of SSC2. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:219-232 [Conf]
  20. Tetsu Iwata, Tomonobu Yoshino, Tomohiro Yuasa, Kaoru Kurosawa
    Round Security and Super-Pseudorandomness of MISTY Type Structure. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:233-247 [Conf]
  21. Henri Gilbert, Marine Minier
    New Results on the Pseudorandomness of Some Blockcipher Constructions. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:248-266 [Conf]
  22. Bart Preneel
    NESSIE: A European Approach to Evaluate Cryptographic Algorithms. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:267-276 [Conf]
  23. Mark Blunden, Adrian Escott
    Related Key Attacks on Reduced Round KASUMI. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:277-285 [Conf]
  24. Masayuki Kanda, Tsutomu Matsumoto
    Security of Camellia against Truncated Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:286-299 [Conf]
  25. Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim
    Impossible Differential Cryptanalysis of Zodiac. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:300-311 [Conf]
  26. Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii, Hidema Tanaka
    The Block Cipher SC2000. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:312-327 [Conf]
  27. Louis Granboulan
    Flaws in Differential Cryptanalysis of Skipjack. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:328-335 [Conf]
  28. Helger Lipmaa, Shiho Moriai
    Efficient Algorithms for Computing Differential Properties of Addition. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:336-350 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002