|
Conferences in DBLP
- Eli Biham, Orr Dunkelman, Nathan Keller
New Results on Boomerang and Rectangle Attacks. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:1-16 [Conf]
- Nikita Borisov, Monica Chew, Robert Johnson, David Wagner
Multiplicative Differentials. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:17-33 [Conf]
- Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman
Differential and Linear Cryptanalysis of a Reduced-Round SC2000. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:34-48 [Conf]
- Dukjae Moon, Kyungdeok Hwang, Wonil Lee, Sangjin Lee, Jongin Lim
Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:49-60 [Conf]
- Ulrich Kühn
Improved Cryptanalysis of MISTY1. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:61-75 [Conf]
- Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba
Multiple Linear Cryptanalysis of a Reduced Round RC6. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:76-88 [Conf]
- Yongjin Yeom, Sangwoo Park, Iljun Kim
On the Security of CAMELLIA against the Square Attack. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:89-99 [Conf]
- Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee, Jongin Lim
Saturation Attacks on Reduced Round Skipjack. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:100-111 [Conf]
- Lars R. Knudsen, David Wagner
Integral Cryptanalysis. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:112-127 [Conf]
- Taizo Shirai, Shoji Kanamaru, George Abe
Improved Upper Bounds of Differential and Linear Characteristic Probability for Camellia. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:128-142 [Conf]
- Ralph Wernsdorf
The Round Functions of RIJNDAEL Generate the Alternating Group. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:143-148 [Conf]
- Tetsu Iwata, Tomonobu Yoshino, Kaoru Kurosawa
Non-cryptographic Primitive for Pseudorandom Permutation. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:149-163 [Conf]
- Kevin Driscoll
BeepBeep: Embedded Real-Time Encryption. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:164-178 [Conf]
- Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel
A New Keystream Generator MUGI. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:179-194 [Conf]
- Shai Halevi, Don Coppersmith, Charanjit S. Jutla
Scream: A Software-Efficient Stream Cipher. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:195-209 [Conf]
- Patrik Ekdahl, Thomas Johansson
Distinguishing Attacks on SOBER-t16 and t32. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:210-224 [Conf]
- Markus Dichtl, Marcus Schafheutle
Linearity Properties of the SOBER-t32 Key Loading. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:225-236 [Conf]
- Markku-Juhani Olavi Saarinen
A Time-Memory Tradeoff Attack Against LILI-128. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:231-236 [Conf]
- Éliane Jaulmes, Antoine Joux, Frédéric Valette
On the Security of Randomized CBC-MAC Beyond the Birthday Paradox Limit: A New Construction. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:237-251 [Conf]
- Daewan Han, Sangwoo Park, Seongtaek Chee
Cryptanalysis of the Modified Version of the Hash Function Proposed at PKC'98. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:252-262 [Conf]
- John Kelsey
Compression and Information Leakage of Plaintext. [Citation Graph (0, 0)][DBLP] FSE, 2002, pp:263-276 [Conf]
|