×

Found 17 Documents (Results 1–17)

A MAC mode for lightweight block ciphers. (English) Zbl 1387.94092

Peyrin, Thomas (ed.), Fast software encryption. 23rd international conference, FSE 2016, Bochum, Germany, March 20–23, 2016. Revised selected papers. Berlin: Springer (ISBN 978-3-662-52992-8/pbk; 978-3-662-52993-5/ebook). Lecture Notes in Computer Science 9783, 43-59 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Towards practical whitebox cryptography: optimizing efficiency and space hardness. (English) Zbl 1404.94041

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53886-9/pbk; 978-3-662-53887-6/ebook). Lecture Notes in Computer Science 10031, 126-158 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Fast and memory-efficient key recovery in side-channel attacks. (English) Zbl 1396.94062

Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 310-327 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Twisted polynomials and forgery attacks on GCM. (English) Zbl 1370.94475

Oswald, Elisabeth (ed.) et al., Advances in cryptology – EUROCRYPT 2015. 34th annual international conference on the theory and applications of cryptographic techniques, Sofia, Bulgaria, April 26–30, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-46799-2/pbk; 978-3-662-46800-5/ebook). Lecture Notes in Computer Science 9056, 762-786 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Comb to pipeline: fast software encryption revisited. (English) Zbl 1367.94303

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 150-171 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Key recovery attacks on recent authenticated ciphers. (English) Zbl 1370.94490

Aranha, F. (ed.) et al., Progress in cryptology – LATINCRYPT 2014. Third international conference on cryptology and information security in Latin America, Florianópolis, Brazil, September 17–19, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16294-2/pbk; 978-3-319-16295-9/ebook). Lecture Notes in Computer Science 8895, 274-287 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

ALE: AES-based lightweight authenticated encryption. (English) Zbl 1321.94042

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 447-466 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the wrong key randomisation and key equivalence hypotheses in Matsui’s algorithm 2. (English) Zbl 1321.94043

Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11–13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 19-38 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Parallelizable and authenticated online ciphers. (English) Zbl 1327.94026

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-42032-0/pbk). Lecture Notes in Computer Science 8269, 424-443 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A model for structure attacks, with applications to PRESENT and Serpent. (English) Zbl 1312.94098

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 49-68 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Key-alternating ciphers in a provable setting: encryption using a small number of public permutations. (Extended abstract). (English) Zbl 1290.94044

Pointcheval, David (ed.) et al., Advances in cryptology – EUROCRYPT 2012. 31st annual international conference on the theory and applications of cryptographic techniques, Cambridge, UK, April 15–19, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29010-7/pbk). Lecture Notes in Computer Science 7237, 45-62 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Improved collision attacks on the reduced-round Grøstl hash function. (English) Zbl 1371.94642

Burmester, Mike (ed.) et al., Information security. 13th international conference, ISC 2010, Boca Raton, FL, USA, October 25–28, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-18177-1/pbk). Lecture Notes in Computer Science 6531, 1-16 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software