The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Matthew J. B. Robshaw: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Hans Dobbertin, Lars R. Knudsen, Matthew J. B. Robshaw
    The Cryptanalysis of the AES - A Brief Survey. [Citation Graph (0, 0)][DBLP]
    AES Conference, 2004, pp:1-10 [Conf]
  2. Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin
    RC6 as the AES. [Citation Graph (0, 0)][DBLP]
    AES Candidate Conference, 2000, pp:337-342 [Conf]
  3. Thomas Peyrin, Henri Gilbert, Frédéric Muller, Matthew J. B. Robshaw
    Combining Compression Functions and Block Cipher-Based Hash Functions. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:315-331 [Conf]
  4. Lars R. Knudsen, Matthew J. B. Robshaw, David Wagner
    Truncated Differentials and Skipjack. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1999, pp:165-180 [Conf]
  5. Burton S. Kaliski Jr., Matthew J. B. Robshaw
    Linear Cryptanalysis Using Multiple Approximations. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:26-39 [Conf]
  6. Sean Murphy, Matthew J. B. Robshaw
    Essential Algebraic Structure within the AES. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2002, pp:1-16 [Conf]
  7. Helena Handschuh, Lars R. Knudsen, Matthew J. B. Robshaw
    Analysis of SHA-1 in Encryption Mode. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2001, pp:70-83 [Conf]
  8. Máire McLoone, Matthew J. B. Robshaw
    Public Key Cryptography and RFID Tags. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2007, pp:372-384 [Conf]
  9. Hoon Wei Lim, Matthew J. B. Robshaw
    A Dynamic Key Infrastructure for Grid. [Citation Graph (0, 0)][DBLP]
    EGC, 2005, pp:255-264 [Conf]
  10. Lars R. Knudsen, Matthew J. B. Robshaw
    Non-Linear Approximations in Linear Cryptoanalysis. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:224-236 [Conf]
  11. Scott Contini, Ronald L. Rivest, Matthew J. B. Robshaw, Yiqun Lisa Yin
    Improved Analysis of Some Simplified Variants of RC6. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:1-15 [Conf]
  12. Carlos Cid, Sean Murphy, Matthew J. B. Robshaw
    Small Scale Variants of the AES. [Citation Graph (0, 0)][DBLP]
    FSE, 2005, pp:145-162 [Conf]
  13. Burton S. Kaliski Jr., Matthew J. B. Robshaw
    Fast Block Cipher Proposal. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1993, pp:33-40 [Conf]
  14. Burton S. Kaliski Jr., Matthew J. B. Robshaw
    Linear Cryptanalysis Using Multiple Approximations and FEAL. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1994, pp:249-264 [Conf]
  15. Lars R. Knudsen, Vincent Rijmen, Ronald L. Rivest, Matthew J. B. Robshaw
    On the Design and Security of RC2. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:206-221 [Conf]
  16. Hoon Wei Lim, Matthew J. B. Robshaw
    On Identity-Based Cryptography and Grid Computing. [Citation Graph (0, 0)][DBLP]
    International Conference on Computational Science, 2004, pp:474-477 [Conf]
  17. Chez Ciechanowicz, Keith M. Martin, Fred Piper, Matthew J. B. Robshaw
    Ten Years of Information Security Masters Programmes. [Citation Graph (0, 0)][DBLP]
    World Conference on Information Security Education, 2003, pp:215-230 [Conf]
  18. Carlos Cid, Sean Murphy, Matthew J. B. Robshaw
    An Algebraic Framework for Cipher Embeddings. [Citation Graph (0, 0)][DBLP]
    IMA Int. Conf., 2005, pp:278-289 [Conf]
  19. Simon Fischer 0002, Willi Meier, Côme Berbain, Jean-François Biasse, Matthew J. B. Robshaw
    Non-randomness in eSTREAM Candidates Salsa20 and TSC-4. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2006, pp:2-16 [Conf]
  20. Ruby B. Lee, Zhijie Shi, Yiqun Lisa Yin, Ronald L. Rivest, Matthew J. B. Robshaw
    On Permutation Operations in Cipher Design. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:569-577 [Conf]
  21. Jakob Jonsson, Matthew J. B. Robshaw
    Securing RSA-KEM via the AES. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:29-46 [Conf]
  22. Matthew J. B. Robshaw
    Searching for Compact Algorithms: cgen. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:37-49 [Conf]
  23. Sean Murphy, Matthew J. B. Robshaw
    Key-Dependent S-Boxes and Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2002, v:27, n:3, pp:229-255 [Journal]
  24. Matthew J. B. Robshaw
    On Evaluating the Linear Complexity of a Sequence of Least Period 2n. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1994, v:4, n:3, pp:263-269 [Journal]
  25. Olivier Billet, Matthew J. B. Robshaw, Thomas Peyrin
    On Building Hash Functions from Multivariate Quadratic Equations. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:82-95 [Conf]
  26. Andrey Bogdanov, Lars R. Knudsen, Gregor Leander, Christof Paar, Axel Poschmann, Matthew J. B. Robshaw, Yannick Seurin, C. Vikkelsoe
    PRESENT: An Ultra-Lightweight Block Cipher. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:450-466 [Conf]
  27. Máire McLoone, Matthew J. B. Robshaw
    New Architectures for Low-Cost Public Key Cryptography on RFID Tags. [Citation Graph (0, 0)][DBLP]
    ISCAS, 2007, pp:1827-1830 [Conf]
  28. K. G. Paterson, Matthew J. B. Robshaw
    Storage efficient decoding for a class of binary be Bruijn sequences. [Citation Graph (0, 0)][DBLP]
    Discrete Mathematics, 1995, v:138, n:1-3, pp:327-341 [Journal]

  29. Looking Back at a New Hash Function. [Citation Graph (, )][DBLP]


  30. The Intel AES Instructions Set and the SHA-3 Candidates. [Citation Graph (, )][DBLP]


  31. Hash Functions and RFID Tags: Mind the Gap. [Citation Graph (, )][DBLP]


  32. PRINTcipher: A Block Cipher for IC-Printing. [Citation Graph (, )][DBLP]


  33. HB#: Increasing the Security and Efficiency of HB+. [Citation Graph (, )][DBLP]


  34. Good Variants of HB+ Are Hard to Find. [Citation Graph (, )][DBLP]


  35. How to Encrypt with the LPN Problem. [Citation Graph (, )][DBLP]


  36. Lightweight Cryptography and RFID: Tackling the Hidden Overheads. [Citation Graph (, )][DBLP]


  37. The Cryptanalysis of Reduced-Round SMS4. [Citation Graph (, )][DBLP]


  38. Correlated Keystreams in Moustique. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.005secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002