History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 71 total

Square attack on 7-round Kiasu-BC. (English)
Manulis, Mark (ed.) et al., Applied cryptography and network security. 14th international conference, ACNS 2016, Guildford, UK, June 19‒22, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-39554-8/pbk; 978-3-319-39555-5/ebook). Lecture Notes in Computer Science 9696, 500-517 (2016).
WorldCat.org
1
Improved rebound attacks on AESQ: core permutation of CAESAR candidate PAEQ. (English)
Liu, Joseph K.K. (ed.) et al., Information security and privacy. 21st Australasian conference, ACISP 2016, Melbourne, VIC, Australia, July 4‒6, 2016. Proceedings. Part II. Cham: Springer (ISBN 978-3-319-40366-3/pbk; 978-3-319-40367-0/ebook). Lecture Notes in Computer Science 9723, 301-316 (2016).
WorldCat.org
2
Forgery attacks on round-reduced ICEPOLE-128. (English)
Dunkelman, Orr (ed.) et al., Selected areas in cryptography ‒ SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12‒14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 479-492 (2016).
WorldCat.org
3
Higher-order cryptanalysis of lowmc. (English)
Kwon, Soonhak (ed.) et al., Information security and cryptology ‒ ICISC 2015. 18th international conference, Seoul, South Korea, November 25‒27, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-30839-5/pbk; 978-3-319-30840-1/ebook). Lecture Notes in Computer Science 9558, 87-101 (2016).
WorldCat.org
4
Cryptanalysis of Reduced NORX. (English)
FSE, 554-574(2016)
WorldCat.org
5
Analysis of the Kupyna-256 Hash Function. (English)
FSE, 575-590(2016)
WorldCat.org
6
Analysis of SHA-512/224 and SHA-512/256. (English)
Iwata, Tetsu (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 ‒ December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 612-630 (2015).
WorldCat.org
7
Heuristic tool for linear cryptanalysis with applications to CAESAR candidates. (English)
Iwata, Tetsu (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 ‒ December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 490-509 (2015).
WorldCat.org
8
Cryptanalysis of Ascon. (English)
Nyberg, Kaisa (ed.), Topics in cryptology ‒ CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20‒24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 371-387 (2015).
WorldCat.org
9
Related-key forgeries for prøst-OTR. (English)
Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8‒11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 282-296 (2015).
WorldCat.org
10
Collision attack on 5 rounds of grøstl. (English)
Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3‒5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 509-521 (2015).
WorldCat.org
11
Branching heuristics in differential collision search with applications to SHA-512. (English)
Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3‒5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 473-488 (2015).
WorldCat.org
12
Key recovery attacks on recent authenticated ciphers. (English)
Aranha, F. (ed.) et al., Progress in cryptology ‒ LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17‒19, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). Lecture Notes in Computer Science 8895, 274-287 (2015).
WorldCat.org
13
The rebound attack and subspace distinguishers: application to Whirlpool. (English)
J. Cryptology 28, No. 2, 257-296 (2015).
WorldCat.org
14
Towards Fresh and Hybrid Re-Keying Schemes with Beyond Birthday Security. (English)
CARDIS, 225-241(2015)
WorldCat.org
15
Differential cryptanalysis of SipHash. (English)
Joux, Antoine (ed.) et al., Selected areas in cryptography ‒ SAC 2014. 21st international conference, Montreal, QC, Canada, August 14‒15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 165-182 (2014).
WorldCat.org
16
Malicious hashing: Eve’s variant of SHA-1. (English)
Joux, Antoine (ed.) et al., Selected areas in cryptography ‒ SAC 2014. 21st international conference, Montreal, QC, Canada, August 14‒15, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-13050-7/pbk; 978-3-319-13051-4/ebook). Lecture Notes in Computer Science 8781, 1-19 (2014).
WorldCat.org
17
ALE: AES-based lightweight authenticated encryption. (English)
Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11‒13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 447-466 (2014).
WorldCat.org
18
On the Security of Fresh Re-keying to Counteract Side-Channel and Fault Attacks. (English)
CARDIS, 233-244(2014)
WorldCat.org
19
Differential cryptanalysis of Keccak variants. (English)
Stam, Martijn (ed.), Cryptography and coding. 14th IMA international conference, IMACC 2013, Oxford, UK, December 17‒19, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-45238-3/pbk). Lecture Notes in Computer Science 8308, 141-157 (2013).
WorldCat.org
20
first | previous | 1 21 41 61 | next | last

Result 1 to 20 of 71 total

Valid XHTML 1.0 Transitional Valid CSS!