History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 87 total

Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE. (English)
EUROCRYPT (1), 231-253(2015)
WorldCat.org
1
Cryptanalysis of SP Networks with Partial Non-Linear Layers. (English)
EUROCRYPT (1), 315-342(2015)
WorldCat.org
3
Derandomized Graph Product Results Using the Low Degree Long Code. (English)
STACS, 275-287(2015)
WorldCat.org
4
A parallel repetition theorem for entangled projection games. (English)
Computational ComplexityComputational Complexity 24, N0. 2, 201-254(2015)
WorldCat.org
5
Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function. (English)
EUROCRYPT (1), 733-761(2015)
WorldCat.org
6
The Computational Benefit of Correlated Instances. (English)
ITCS, 219-228(2015)
WorldCat.org
7
Cryptanalysis of iterated Even-Mansour schemes with two keys. (English)
Sarkar, Palash (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 439-457 (2014).
WorldCat.org
8
Improved practical attacks on round-reduced Keccak. (English)
J. Cryptology 27, No. 2, 183-209 (2014).
WorldCat.org
9
Improved generic attacks against hash-based macs and HAIFA. (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 149-168 (2014).
WorldCat.org
10
Improved Differential Cryptanalysis of Round-Reduced Speck. (English)
Selected Areas in Cryptography, 147-164(2014)
WorldCat.org
11
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. (English)
FSE, 390-410(2014)
WorldCat.org
12
Dissection: a new paradigm for solving bicomposite search problems. (English)
Commun. ACMCommun. ACM 57, N0. 10, 98-105(2014)
WorldCat.org
13
Direct Product Testing. (English)
IEEE Conference on Computational Complexity, 188-196(2014)
WorldCat.org
14
A Parallel Repetition Theorem for Entangled Projection Games. (English)
IEEE Conference on Computational Complexity, 197-208(2014)
WorldCat.org
15
Cryptanalysis of FIDES. (English)
FSE, 224-240(2014)
WorldCat.org
16
Composition of low-error 2-query PCPs using decodable PCPs. (English)
SIAM J. Comput. 42, No. 6, 2452-2486 (2013).
WorldCat.org
17
Key recovery attacks on 3-round even-mansour, 8-step LED-128, and full $\mathrm{AES}^{2}$. (English)
Sako, Kazue (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1‒5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 337-356 (2013).
WorldCat.org
18
Clustering in the Boolean hypercube in a list decoding regime. (English)
Fomin, Fedor V. (ed.) et al., Automata, languages, and programming. 40th international colloquium, ICALP 2013, Riga, Latvia, July 8‒12, 2013, Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-39205-4/pbk). Lecture Notes in Computer Science 7965, 413-424 (2013).
WorldCat.org
19
Special issue: Selected papers based on the presentations at the 27th annual IEEE conference on computational complexity (CCC 2012), Porto, Portugal, June 26‒29, 2012. (English)
Comput. Complexity 22, No. 2, 215-462 (2013).
WorldCat.org
20
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 87 total

Valid XHTML 1.0 Transitional Valid CSS!