History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 64 total

Related-key forgeries for prøst-OTR. (English)
Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8‒11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 282-296 (2015).
WorldCat.org
1
Collision attack on 5 rounds of grøstl. (English)
Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3‒5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 509-521 (2015).
WorldCat.org
2
Branching heuristics in differential collision search with applications to SHA-512. (English)
Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3‒5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 473-488 (2015).
WorldCat.org
3
Key recovery attacks on recent authenticated ciphers. (English)
Aranha, F. (ed.) et al., Progress in cryptology ‒ LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17‒19, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). Lecture Notes in Computer Science 8895, 274-287 (2015).
WorldCat.org
4
The rebound attack and subspace distinguishers: application to Whirlpool. (English)
J. Cryptology 28, No. 2, 257-296 (2015).
WorldCat.org
5
Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates. (English)
ASIACRYPT (2), 490-509(2015)
WorldCat.org
6
Analysis of SHA-512/224 and SHA-512/256. (English)
ASIACRYPT (2), 612-630(2015)
WorldCat.org
8
ALE: AES-based lightweight authenticated encryption. (English)
Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11‒13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 447-466 (2014).
WorldCat.org
9
Differential Cryptanalysis of SipHash. (English)
Selected Areas in Cryptography, 165-182(2014)
WorldCat.org
10
Malicious Hashing: Eve’s Variant of SHA-1. (English)
Selected Areas in Cryptography, 1-19(2014)
WorldCat.org
11
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. (English)
CARDIS, 233-244(2014)
WorldCat.org
12
Differential cryptanalysis of Keccak variants. (English)
Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17‒19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 141-157 (2013).
WorldCat.org
13
Improved cryptanalysis of reduced RIPEMD-160. (English)
Sako, Kazue (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1‒5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 484-503 (2013).
WorldCat.org
14
Fides: lightweight authenticated cipher with side-channel resistance for constrained hardware. (English)
Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20‒23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 142-158 (2013).
WorldCat.org
15
Improving local collisions: new attacks on reduced SHA-256. (English)
Johansson, Thomas (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26‒30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 262-278 (2013).
WorldCat.org
16
Finding collisions for round-reduced SM3. (English)
Dawson, Ed (ed.), Topics in cryptology ‒ CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 174-188 (2013).
WorldCat.org
17
Collisions for the WIDEA-8 compression function. (English)
Dawson, Ed (ed.), Topics in cryptology ‒ CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 162-173 (2013).
WorldCat.org
18
A simple key-recovery attack on McOE-X. (English)
Pieprzyk, Josef (ed.) et al., Cryptology and network security. 11th international conference, CANS 2012, Darmstadt, Germany, December 12‒14, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-35404-5/pbk). Lecture Notes in Computer Science 7712, 23-31 (2012).
WorldCat.org
19
Collision attack on the Hamsi-256 compression function. (English)
Galbraith, Steven (ed.) et al., Progress in cryptology ‒ INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9‒12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 156-171 (2012).
WorldCat.org
20
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 64 total

Valid XHTML 1.0 Transitional Valid CSS!