History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 61 total

The rebound attack and subspace distinguishers: application to Whirlpool. (English)
J. Cryptology 28, No. 2, 257-296 (2015).
WorldCat.org
1
Branching Heuristics in Differential Collision Search with Applications to SHA-512. (English)
FSE, 473-488(2014)
WorldCat.org
3
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. (English)
CARDIS, 233-244(2014)
WorldCat.org
4
Differential Cryptanalysis of SipHash. (English)
Selected Areas in Cryptography, 165-182(2014)
WorldCat.org
5
Collision Attack on 5 Rounds of Grøstl. (English)
FSE, 509-521(2014)
WorldCat.org
6
Malicious Hashing: Eve’s Variant of SHA-1. (English)
Selected Areas in Cryptography, 1-19(2014)
WorldCat.org
7
Key Recovery Attacks on Recent Authenticated Ciphers. (English)
LATINCRYPT, 274-287(2014)
WorldCat.org
8
Differential cryptanalysis of keccak variants. (English)
Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17‒19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 141-157 (2013).
WorldCat.org
9
Improved cryptanalysis of reduced RIPEMD-160. (English)
Sako, Kazue (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1‒5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 484-503 (2013).
WorldCat.org
10
Fides: lightweight authenticated cipher with side-channel resistance for constrained hardware. (English)
Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20‒23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 142-158 (2013).
WorldCat.org
11
Improving local collisions: new attacks on reduced SHA-256. (English)
Johansson, Thomas (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26‒30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 262-278 (2013).
WorldCat.org
12
Finding collisions for round-reduced SM3. (English)
Dawson, Ed (ed.), Topics in cryptology ‒ CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 174-188 (2013).
WorldCat.org
13
Collisions for the WIDEA-8 compression function. (English)
Dawson, Ed (ed.), Topics in cryptology ‒ CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25‒March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 162-173 (2013).
WorldCat.org
14
ALE: AES-Based Lightweight Authenticated Encryption. (English)
FSE, 447-466(2013)
WorldCat.org
15
Collision attack on the Hamsi-256 compression function. (English)
Galbraith, Steven (ed.) et al., Progress in cryptology ‒ INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9‒12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 156-171 (2012).
WorldCat.org
16
Differential analysis of the LED block cipher. (English)
Wang, Xiaoyun (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2012. 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2‒6, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34960-7/pbk). Lecture Notes in Computer Science 7658, 190-207 (2012).
WorldCat.org
17
Collision attacks on the reduced dual-stream hash function RIPEMD-128. (English)
Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19‒21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 226-243 (2012).
WorldCat.org
18
Differential attacks on reduced RIPEMD-160. (English)
Gollmann, Dieter (ed.) et al., Information security. 15th international conference, ISC 2012, Passau, Germany, September 19‒21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33382-8/pbk). Lecture Notes in Computer Science 7483, 23-38 (2012).
WorldCat.org
19
Cryptanalysis of round-reduced HAS-160. (English)
Kim, Howon (ed.), Information security and cryptology ‒ ICISC 2011. 14th international conference, Seoul, Korea, November 30‒December 2, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-31911-2/pbk). Lecture Notes in Computer Science 7259, 33-47 (2012).
WorldCat.org
20
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 61 total

Valid XHTML 1.0 Transitional Valid CSS!