History

Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 77 total

Improved practical attacks on round-reduced Keccak. (English)
J. Cryptology 27, No. 2, 183-209 (2014).
1
Improved generic attacks against hash-based macs and HAIFA. (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 149-168 (2014).
2
Dissection: a new paradigm for solving bicomposite search problems. (English)
Commun. ACMCommun. ACM 57, N0. 10, 98-105(2014)
3
A Parallel Repetition Theorem for Entangled Projection Games. (English)
IEEE Conference on Computational Complexity, 197-208(2014)
4
Cryptanalysis of Iterated Even-Mansour Schemes with Two Keys. (English)
ASIACRYPT (1), 439-457(2014)
5
Improved Practical Attacks on Round-Reduced Keccak. (English)
J. CryptologyJ. Cryptology 27, N0. 2, 183-209(2014)
6
Direct Product Testing. (English)
IEEE Conference on Computational Complexity, 188-196(2014)
7
Composition of low-error 2-query PCPs using decodable PCPs. (English)
SIAM J. Comput. 42, No. 6, 2452-2486 (2013).
8
Key recovery attacks on 3-round even-mansour, 8-step LED-128, and full $\mathrm{AES}^{2}$. (English)
Sako, Kazue (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1‒5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 337-356 (2013).
9
Clustering in the Boolean hypercube in a list decoding regime. (English)
Fomin, Fedor V. (ed.) et al., Automata, languages, and programming. 40th international colloquium, ICALP 2013, Riga, Latvia, July 8‒12, 2013, Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-39205-4/pbk). Lecture Notes in Computer Science 7965, 413-424 (2013).
10
Special issue: Selected papers based on the presentations at the 27th annual IEEE conference on computational complexity (CCC 2012), Porto, Portugal, June 26‒29, 2012. (English)
Comput. Complexity 22, No. 2, 215-462 (2013).
11
Covering CSPs. (English)
IEEE Conference on Computational Complexity, 207-218(2013)
12
Special Issue "Conference on Computational Complexity 2012" Guest editors’ foreword. (English)
Computational ComplexityComputational Complexity 22, N0. 2, 215-217(2013)
13
PCPs via Low-Degree Long Code and Hardness for Constrained Hypergraph Coloring. (English)
FOCS, 340-349(2013)
14
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials. (English)
FSE, 219-240(2013)
15
Applying cube attacks to stream ciphers in realistic scenarios. (English)
Cryptogr. Commun. 4, No. 3-4, 217-232 (2012).
16
New attacks on Keccak-224 and Keccak-256. (English)
Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19‒21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 442-461 (2012).
17
Improved attacks on full GOST. (English)
Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19‒21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 9-28 (2012).
18
Efficient dissection of composite problems, with applications to cryptanalysis, knapsacks, and combinatorial search problems. (English)
Safavi-Naini, Reihaneh (ed.) et al., Advances in cryptology ‒ CRYPTO 2012. 32nd annual cryptology conference, Santa Barbara, CA, USA, August 19‒23, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32008-8/pbk). Lecture Notes in Computer Science 7417, 719-740 (2012).
19
An experimentally verified attack on full Grain-128 using dedicated reconfigurable hardware. (English)
Lee, Dong Hoon (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4‒8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 327-343 (2011).
20
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 77 total