The SCEAS System
Navigation Menu

Conferences in DBLP

Fast Software Encryption (FSE) (fse)
2002 (conf/fse/2002)

  1. Eli Biham, Orr Dunkelman, Nathan Keller
    New Results on Boomerang and Rectangle Attacks. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:1-16 [Conf]
  2. Nikita Borisov, Monica Chew, Robert Johnson, David Wagner
    Multiplicative Differentials. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:17-33 [Conf]
  3. Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman
    Differential and Linear Cryptanalysis of a Reduced-Round SC2000. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:34-48 [Conf]
  4. Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim
    Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:49-60 [Conf]
  5. Ulrich Kühn
    Improved Cryptanalysis of MISTY1. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:61-75 [Conf]
  6. Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba
    Multiple Linear Cryptanalysis of a Reduced Round RC6. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:76-88 [Conf]
  7. Yongjin Yeom, Sangwoo Park, Iljun Kim
    On the Security of CAMELLIA against the Square Attack. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:89-99 [Conf]
  8. Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim
    Saturation Attacks on Reduced Round Skipjack. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:100-111 [Conf]
  9. Lars R. Knudsen, David Wagner
    Integral Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:112-127 [Conf]
  10. Taizo Shirai, Shoji Kanamaru, George Abe
    Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:128-142 [Conf]
  11. Ralph Wernsdorf
    The Round Functions of RIJNDAEL Generate the Alternating Group. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:143-148 [Conf]
  12. Tetsu Iwata, Tomonobu Yoshino, Kaoru Kurosawa
    Non-cryptographic Primitive for Pseudorandom Permutation. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:149-163 [Conf]
  13. Kevin Driscoll
    BeepBeep: Embedded Real-Time Encryption. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:164-178 [Conf]
  14. Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel
    A New Keystream Generator MUGI. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:179-194 [Conf]
  15. Shai Halevi, Don Coppersmith, Charanjit S. Jutla
    Scream: A Software-Efficient Stream Cipher. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:195-209 [Conf]
  16. Patrik Ekdahl, Thomas Johansson
    Distinguishing Attacks on SOBER-t16 and t32. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:210-224 [Conf]
  17. Markus Dichtl, Marcus Schafheutle
    Linearity Properties of the SOBER-t32 Key Loading. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:225-236 [Conf]
  18. Markku-Juhani Olavi Saarinen
    A Time-Memory Tradeoff Attack Against LILI-128. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:231-236 [Conf]
  19. Éliane Jaulmes, Antoine Joux, Frédéric Valette
    On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:237-251 [Conf]
  20. Daewan Han, Sangwoo Park, Seongtaek Chee
    Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:252-262 [Conf]
  21. John Kelsey
    Compression and Information Leakage of Plaintext. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:263-276 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002