History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 | next | last

Result 1 to 20 of 52 total

Differential cryptanalysis of keccak variants. (English)
Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17‒19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 141-157 (2013).
WorldCat.org
1
Improved cryptanalysis of reduced RIPEMD-160. (English)
Sako, Kazue (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1‒5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 484-503 (2013).
WorldCat.org
2
Fides: lightweight authenticated cipher with side-channel resistance for constrained hardware. (English)
Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20‒23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 142-158 (2013).
WorldCat.org
3
Improving local collisions: new attacks on reduced SHA-256. (English)
Johansson, Thomas (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26‒30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 262-278 (2013).
WorldCat.org
4
Finding collisions for round-reduced SM3. (English)
Dawson, Ed (ed.), Topics in cryptology ‒ CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 174-188 (2013).
WorldCat.org
5
Collisions for the WIDEA-8 compression function. (English)
Dawson, Ed (ed.), Topics in cryptology ‒ CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 162-173 (2013).
WorldCat.org
6
Differential analysis of the LED block cipher. (English)
Wang, Xiaoyun (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2‒6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 190-207 (2012).
WorldCat.org
7
Collision attacks on the reduced dual-stream hash function RIPEMD-128. (English)
Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19‒21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 226-243 (2012).
WorldCat.org
8
Differential attacks on reduced RIPEMD-160. (English)
Gollmann, Dieter (ed.) et al., Information security. 15th international conference, ISC 2012, Passau, Germany, September 19‒21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33382-8/pbk). Lecture Notes in Computer Science 7483, 23-38 (2012).
WorldCat.org
9
Cryptanalysis of round-reduced HAS-160. (English)
Kim, Howon (ed.), Information security and cryptology ‒ ICISC 2011. 14th international conference, Seoul, Korea, November 30‒December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 33-47 (2012).
WorldCat.org
10
Memoryless near-collisions via coding theory. (English)
Des. Codes Cryptography 62, No. 1, 1-18 (2012).
WorldCat.org
11
A Simple Key-Recovery Attack on McOE-X. (English)
CANS, 23-31(2012)
WorldCat.org
12
Preimage Attacks against PKC98-Hash and HAS-V. (English)
IEICE TransactionsIEICE Transactions 95-A, N0. 1, 111-124(2012)
WorldCat.org
13
Collision Attack on the Hamsi-256 Compression Function. (English)
INDOCRYPT, 156-171(2012)
WorldCat.org
14
Boomerang distinguisher for the SIMD-512 compression function. (English)
Bernstein, Daniel J. (ed.) et al., Progress in cryptology ‒ INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11‒14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 255-269 (2011).
WorldCat.org
15
Finding SHA-2 characteristics: searching through a minefield of contradictions. (English)
Lee, Dong Hoon (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4‒8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 288-307 (2011).
WorldCat.org
16
Second-order differential collisions for reduced SHA-256. (English)
Lee, Dong Hoon (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4‒8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 270-287 (2011).
WorldCat.org
17
Preimage attacks against PKC98-Hash and HAS-V. (English)
Rhee, Kyung-Hyune (ed.) et al., Information security and cryptology ‒ ICISC 2010. 13th international conference, Seoul, Korea, December 1‒3, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24208-3/pbk). Lecture Notes in Computer Science 6829, 68-91 (2011).
WorldCat.org
18
Practical attacks on the Maelstrom-0 compression function. (English)
Lopez, Javier (ed.) et al., Applied cryptography and network security. 9th international conference, ACNS 2011, Nerja, Spain, June 7‒10, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21553-7/pbk). Lecture Notes in Computer Science 6715, 449-461 (2011).
WorldCat.org
19
Parallel Architecture Manipulators for Use in Masticatory Studies. (English)
IJIMRIJIMR 1, N0. 4, 100-122(2011)
WorldCat.org
20
first | previous | 1 21 41 | next | last

Result 1 to 20 of 52 total

Valid XHTML 1.0 Transitional Valid CSS!