×

Found 68 Documents (Results 1–68)

Jammin’ on the deck. (English) Zbl 1519.94043

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13792, 555-584 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Thinking outside the superbox. (English) Zbl 1487.94104

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 337-367 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

KangarooTwelve: fast hashing based on \({\mathrm {KECCAK}\mathrm{-}p}{}\). (English) Zbl 1440.94031

Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 400-418 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Full-state keyed duplex with built-in multi-user support. (English) Zbl 1417.94055

Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10625, 606-637 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Security of keyed sponge constructions using a modular proof approach. (English) Zbl 1382.94045

Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8–11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 364-384 (2015).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Sakura: a flexible coding for tree hashing. (English) Zbl 1353.94036

Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10–13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 217-234 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Walter Gautschi, Volume 2. Selected works with commentaries. Edited by Claude Brezinski and Ahmed Sameh. (English) Zbl 1292.01006

Contemporary Mathematicians. New York, NY: Birkhäuser/Springer (ISBN 978-1-4614-7048-9/hbk; 978-1-4614-7049-6/ebook). xiii, 914 p. (2014).
PDFBibTeX XMLCite
Full Text: DOI

Keccak. (English) Zbl 1306.94028

Johansson, Thomas (ed.) et al., Advances in cryptology – EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26–30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 313-314 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Life and work (so far) of Paco Marcellán. (English) Zbl 1318.01004

Arvesú, Jorge (ed.) et al., Recent advances in orthogonal polynomials, special functions, and their applications. 11th international symposium, Universidad Carlos III de Madrid, Leganés, Spain, August 29 – September 2, 2011. Proceedings. Providence, RI: American Mathematical Society (AMS) (ISBN 978-0-8218-6896-6/pbk). Contemporary Mathematics 578, 1-18 (2012).
MSC:  01A70
PDFBibTeX XMLCite
Full Text: DOI

Differential propagation analysis of Keccak. (English) Zbl 1312.94041

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 422-441 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Duplexing the sponge: Single-pass authenticated encryption and other applications. (English) Zbl 1292.94030

Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11–12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 320-337 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Hammerstein system identification in presence of hard memory nonlinearities. (English) Zbl 1216.93034

Giri, Fouad (ed.) et al., Block-oriented nonlinear system identification. Berlin: Springer (ISBN 978-1-84996-512-5/pbk; 978-1-84996-513-2/ebook). Lecture Notes in Control and Information Sciences 404, 347-365 (2010).
MSC:  93B30 93C10 93C05
PDFBibTeX XMLCite

Sponge-based pseudo-random number generators. (English) Zbl 1297.94050

Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems – CHES 2010. 12th international workshop, Santa Barbara, USA, August 17–20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 33-47 (2010).
MSC:  94A60 65C10
PDFBibTeX XMLCite
Full Text: DOI

On the indifferentiability of the sponge construction. (English) Zbl 1149.94304

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 181-197 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Producing collisions for Panama, instantaneously. (English) Zbl 1186.94432

Biryukov, Alex (ed.), Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26–28, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74617-1/pbk). Lecture Notes in Computer Science 4593, 1-18 (2007).
MSC:  94A60 68P25 68N99
PDFBibTeX XMLCite
Full Text: DOI

Difference equations, special functions and orthogonal polynomials. Proceedings of the international conference, Munich, Germany, July 25–30, 2005. (English) Zbl 1117.39001

Hackensack, NJ: World Scientific (ISBN 978-981-270-643-0/hbk). xiii, 773 p. (2007).
PDFBibTeX XMLCite

Distinguishing stream ciphers with convolutional filters. (English) Zbl 1152.94414

De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6–8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 257-270 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

WKB and turning point theory for second-order difference equations. (English) Zbl 1064.39018

Janas, Jan (ed.) et al., Spectral methods for operators of mathematical physics. Proceedings of the international conference on operator theory and its applications in mathematical physics, OTAMP, Bedlewo, Poland, 2002. Basel: Birkhäuser (ISBN 3-7643-7133-1/hbk). Operator Theory: Advances and Applications 154, 101-138 (2004).
MSC:  39A12 39A11 34M60
PDFBibTeX XMLCite

Riemann-Hilbert problems for multiple orthogonal polynomials. (English) Zbl 0997.42012

Bustoz, Joaquin (ed.) et al., Special functions 2000: current perspective and future directions. Proceedings of the NATO Advanced Study Institute, Tempe, AZ, USA, May 29-June 9, 2000. Dordrecht: Kluwer Academic Publishers. NATO Sci. Ser. II, Math. Phys. Chem. 30, 23-59 (2001).
MSC:  42C05 30E25
PDFBibTeX XMLCite

Œuvres complètes. Collected papers. Ed. by Gerrit van Dijk. Volumes 1 and 2. (French, Dutch, English, German) Zbl 0779.01010

Berlin: Springer-Verlag (ISBN 3-540-55560-9/hbk). ix, 566 p./v.1; vi, 750 p./v.2 (1993).
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software