History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 96 total

New Attacks on the Concatenation and XOR Hash Combiners. (English)
EUROCRYPT (1), 484-508(2016)
WorldCat.org
1
Toward the KRW Composition Conjecture: Cubic Formula Lower Bounds via Communication Complexity. (English)
Conference on Computational Complexity, 3:1-3:51(2016)
WorldCat.org
2
Optimized interpolation attacks on lowMC. (English)
Iwata, Tetsu (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 ‒ December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 535-560 (2015).
WorldCat.org
3
New attacks on Feistel structures with improved memory complexities. (English)
Gennaro, Rosario (ed.) et al., Advances in cryptology ‒ CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16‒20, 2015. Proceedings. Part I. Berlin, Heidelberg: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 433-454 (2015).
WorldCat.org
4
PCPs via the low-degree long code and hardness for constrained hypergraph coloring. (English)
Isr. J. Math. 209, Part 2, 611-649 (2015).
WorldCat.org
5
Reflections on slide with a twist attacks. (English)
Des. Codes Cryptography 77, No. 2-3, 633-651 (2015).
WorldCat.org
6
Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function. (English)
Oswald, Elisabeth (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26‒30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 733-761 (2015).
WorldCat.org
7
Cryptanalysis of SP networks with partial non-linear layers. (English)
Oswald, Elisabeth (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26‒30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 315-342 (2015).
WorldCat.org
8
Cryptanalytic time-memory-data tradeoffs for FX-constructions with applications to PRINCE and PRIDE. (English)
Oswald, Elisabeth (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26‒30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 231-253 (2015).
WorldCat.org
9
Improved linear sieving techniques with applications to step-reduced LED-64. (English)
Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3‒5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 390-410 (2015).
WorldCat.org
10
Cryptanalysis of FIDES. (English)
Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3‒5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 224-240 (2015).
WorldCat.org
11
Improved top-down techniques in differential cryptanalysis. (English)
Lauter, Kristin (ed.) et al., Progress in cryptology ‒ LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23‒26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 139-156 (2015).
WorldCat.org
12
Polynomially low error PCPs with $\operatorname{polyloglog} n$ queries via modular composition. (English)
Proceedings of the 47th annual ACM symposium on theory of computing, STOC ’15, Portland, OR, USA, June 14‒17, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3536-2). 267-276 (2015).
WorldCat.org
13
A parallel repetition theorem for entangled projection games. (English)
Comput. Complexity 24, No. 2, 201-254 (2015).
WorldCat.org
14
Derandomized Graph Product Results Using the Low Degree Long Code. (English)
STACS, 275-287(2015)
WorldCat.org
15
The Computational Benefit of Correlated Instances. (English)
ITCS, 219-228(2015)
WorldCat.org
16
Improved differential cryptanalysis of round-reduced speck. (English)
Joux, Antoine (ed.) et al., Selected areas in cryptography ‒ SAC 2014. 21st international conference, Montreal, QC, Canada, August 14‒15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 147-164 (2014).
WorldCat.org
18
Collision attacks on up to 5 rounds of SHA-3 using generalized internal differentials. (English)
Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11‒13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 219-240 (2014).
WorldCat.org
19
Analytical approach to parallel repetition. (English)
Proceedings of the 46th annual ACM symposium on theory of computing, STOC ’14, New York, NY, USA, May 31 ‒ June 3, 2014. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2710-7). 624-633 (2014).
WorldCat.org
20
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 96 total

Valid XHTML 1.0 Transitional Valid CSS!