History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 77 total

Improved practical attacks on round-reduced Keccak. (English)
J. Cryptology 27, No. 2, 183-209 (2014).
WorldCat.org
1
Improved generic attacks against hash-based macs and HAIFA. (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 149-168 (2014).
WorldCat.org
2
Dissection: a new paradigm for solving bicomposite search problems. (English)
Commun. ACMCommun. ACM 57, N0. 10, 98-105(2014)
WorldCat.org
3
A Parallel Repetition Theorem for Entangled Projection Games. (English)
IEEE Conference on Computational Complexity, 197-208(2014)
WorldCat.org
4
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. (English)
ASIACRYPT (1), 439-457(2014)
WorldCat.org
5
Improved Practical Attacks on Round-Reduced Keccak. (English)
J. CryptologyJ. Cryptology 27, N0. 2, 183-209(2014)
WorldCat.org
6
Direct Product Testing. (English)
IEEE Conference on Computational Complexity, 188-196(2014)
WorldCat.org
7
Composition of low-error 2-query PCPs using decodable PCPs. (English)
SIAM J. Comput. 42, No. 6, 2452-2486 (2013).
WorldCat.org
8
Key recovery attacks on 3-round even-mansour, 8-step LED-128, and full $\mathrm{AES}^{2}$. (English)
Sako, Kazue (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1‒5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 337-356 (2013).
WorldCat.org
9
Clustering in the Boolean hypercube in a list decoding regime. (English)
Fomin, Fedor V. (ed.) et al., Automata, languages, and programming. 40th international colloquium, ICALP 2013, Riga, Latvia, July 8‒12, 2013, Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-39205-4/pbk). Lecture Notes in Computer Science 7965, 413-424 (2013).
WorldCat.org
10
Special issue: Selected papers based on the presentations at the 27th annual IEEE conference on computational complexity (CCC 2012), Porto, Portugal, June 26‒29, 2012. (English)
Comput. Complexity 22, No. 2, 215-462 (2013).
WorldCat.org
11
Covering CSPs. (English)
IEEE Conference on Computational Complexity, 207-218(2013)
WorldCat.org
12
Special Issue "Conference on Computational Complexity 2012" Guest editors’ foreword. (English)
Computational ComplexityComputational Complexity 22, N0. 2, 215-217(2013)
WorldCat.org
13
PCPs via Low-Degree Long Code and Hardness for Constrained Hypergraph Coloring. (English)
FOCS, 340-349(2013)
WorldCat.org
14
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials. (English)
FSE, 219-240(2013)
WorldCat.org
15
Applying cube attacks to stream ciphers in realistic scenarios. (English)
Cryptogr. Commun. 4, No. 3-4, 217-232 (2012).
WorldCat.org
16
New attacks on Keccak-224 and Keccak-256. (English)
Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19‒21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 442-461 (2012).
WorldCat.org
17
Improved attacks on full GOST. (English)
Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19‒21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 9-28 (2012).
WorldCat.org
18
Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. (English)
Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology ‒ CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19‒23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 719-740 (2012).
WorldCat.org
19
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. (English)
Lee, Dong Hoon (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4‒8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 327-343 (2011).
WorldCat.org
20
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 77 total

Valid XHTML 1.0 Transitional Valid CSS!