History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 98 total

Key recovery attacks on iterated Even-Mansour encryption schemes. (English)
J. Cryptology 29, No. 4, 697-728 (2016).
WorldCat.org
1
New attacks on the concatenation and XOR hash combiners. (English)
Fischlin, Marc (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2016. 35th annual international conference on the theory and applications of cryptographic techniques, Vienna, Austria, May 8‒12, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49889-7/pbk; 978-3-662-49890-3/ebook). Lecture Notes in Computer Science 9665, 484-508 (2016).
WorldCat.org
2
Memory-Efficient Algorithms for Finding Needles in Haystacks. (English)
CRYPTO (2), 185-206(2016)
WorldCat.org
3
Toward the KRW Composition Conjecture: Cubic Formula Lower Bounds via Communication Complexity. (English)
Conference on Computational Complexity, 3:1-3:51(2016)
WorldCat.org
4
Optimized interpolation attacks on lowMC. (English)
Iwata, Tetsu (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 ‒ December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 535-560 (2015).
WorldCat.org
5
New attacks on Feistel structures with improved memory complexities. (English)
Gennaro, Rosario (ed.) et al., Advances in cryptology ‒ CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16‒20, 2015. Proceedings. Part I. Berlin, Heidelberg: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 433-454 (2015).
WorldCat.org
6
PCPs via the low-degree long code and hardness for constrained hypergraph coloring. (English)
Isr. J. Math. 209, Part 2, 611-649 (2015).
WorldCat.org
7
Reflections on slide with a twist attacks. (English)
Des. Codes Cryptography 77, No. 2-3, 633-651 (2015).
WorldCat.org
8
Cube attacks and cube-attack-like cryptanalysis on the round-reduced Keccak sponge function. (English)
Oswald, Elisabeth (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26‒30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 733-761 (2015).
WorldCat.org
9
Cryptanalysis of SP networks with partial non-linear layers. (English)
Oswald, Elisabeth (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26‒30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 315-342 (2015).
WorldCat.org
10
Cryptanalytic time-memory-data tradeoffs for FX-constructions with applications to PRINCE and PRIDE. (English)
Oswald, Elisabeth (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26‒30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 231-253 (2015).
WorldCat.org
11
Improved linear sieving techniques with applications to step-reduced LED-64. (English)
Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3‒5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 390-410 (2015).
WorldCat.org
12
Cryptanalysis of FIDES. (English)
Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3‒5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 224-240 (2015).
WorldCat.org
13
Improved top-down techniques in differential cryptanalysis. (English)
Lauter, Kristin (ed.) et al., Progress in cryptology ‒ LATINCRYPT 2015. 4th international conference on cryptology and information security in Latin America, Guadalajara, Mexico, August 23‒26, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-22173-1/pbk; 978-3-319-22174-8/ebook). Lecture Notes in Computer Science 9230, 139-156 (2015).
WorldCat.org
14
Polynomially low error PCPs with $\operatorname{polyloglog} n$ queries via modular composition. (English)
Proceedings of the 47th annual ACM symposium on theory of computing, STOC ’15, Portland, OR, USA, June 14‒17, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3536-2). 267-276 (2015).
WorldCat.org
15
A parallel repetition theorem for entangled projection games. (English)
Comput. Complexity 24, No. 2, 201-254 (2015).
WorldCat.org
16
The Computational Benefit of Correlated Instances. (English)
ITCS, 219-228(2015)
WorldCat.org
17
Derandomized Graph Product Results Using the Low Degree Long Code. (English)
STACS, 275-287(2015)
WorldCat.org
18
Improved differential cryptanalysis of round-reduced speck. (English)
Joux, Antoine (ed.) et al., Selected areas in cryptography ‒ SAC 2014. 21st international conference, Montreal, QC, Canada, August 14‒15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 147-164 (2014).
WorldCat.org
20
first | previous | 1 21 41 61 81 | next | last

Result 1 to 20 of 98 total

Valid XHTML 1.0 Transitional Valid CSS!