Sign in
Symmetric Cryptography
2007
2008
2009
2007
2009
Keyphrases
Publications
2009
Ewan Fleischmann
,
Christian Forler
,
Michael Gorski
Classification of the SHA-3 Candidates.
Symmetric Cryptography
(2009)
Sebastiaan Indesteege
,
Elena Andreeva
,
Christophe De Cannière
,
Orr Dunkelman
,
Emilia Käsper
,
Svetla Nikova
,
Bart Preneel
,
Elmar Tischhauser
The Lane hash function.
Symmetric Cryptography
(2009)
Guido Bertoni
,
Joan Daemen
,
Michaël Peeters
,
Gilles Van Assche
Sufficient conditions for sound tree hashing modes.
Symmetric Cryptography
(2009)
Helena Handschuh
,
Stefan Lucks
,
Bart Preneel
,
Phillip Rogaway
09031 Abstracts Collection - Symmetric Cryptography.
Symmetric Cryptography
(2009)
Praveen Gauravaram
,
Lars R. Knudsen
,
Krystian Matusiewicz
,
Florian Mendel
,
Christian Rechberger
,
Martin Schläffer
,
Søren S. Thomsen
Grøstl - a SHA-3 candidate.
Symmetric Cryptography
(2009)
Erik Zenner
Cache Timing Analysis of eStream Finalists.
Symmetric Cryptography
(2009)
Sebastiaan Indesteege
,
Bart Preneel
Practical Collisions for EnRUPT.
Symmetric Cryptography
(2009)
Guido Bertoni
,
Joan Daemen
,
Michaël Peeters
,
Gilles Van Assche
The Road from Panama to Keccak via RadioGatún.
Symmetric Cryptography
(2009)
Jorge Nakahara Jr.
,
Daniel Santana de Freitas
Mini-ciphers: a reliable testbed for cryptanalysis?
Symmetric Cryptography
(2009)
Orr Dunkelman
,
Eli Biham
The SHAvite-3 - A New Hash Function.
Symmetric Cryptography
(2009)
Anne Canteaut
,
María Naya-Plasencia
Internal collision attack on Maraca.
Symmetric Cryptography
(2009)
Matthias Krause
,
Dirk Stegemann
Algebraic Attacks against Linear RFID Authentication Protocols.
Symmetric Cryptography
(2009)
Helena Handschuh
,
Stefan Lucks
,
Bart Preneel
,
Phillip Rogaway
09031 Executive Summary - Symmetric Cryptography.
Symmetric Cryptography
(2009)
Jean-Philippe Aumasson
,
Itai Dinur
,
Willi Meier
,
Adi Shamir
Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium.
Symmetric Cryptography
(2009)
Sebastiaan Indesteege
,
Bart Preneel
Practical Preimages for Maraca.
Symmetric Cryptography
(2009)
Andrea Röck
,
Cédric Lauradoux
Parallel Generation of l-Sequences.
Symmetric Cryptography
(2009)
Miia Hermelin
,
Joo Yeon Cho
,
Kaisa Nyberg
Statistical Tests for Key Recovery Using Multidimensional Extension of Matsui's Algorithm 1.
Symmetric Cryptography
(2009)
Johannes Buchmann
,
Jintai Ding
,
Mohamed Saied Emam Mohamed
,
Wael Said Abd Elmageed Mohamed
MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis.
Symmetric Cryptography
(2009)
volume 9031, 2009
Symmetric Cryptography, 11.01. - 16.01.2009
Symmetric Cryptography
9031 (2009)
2007
Markus Dichtl
Cryptographic Shuffling of Random and Pseudorandom Sequences.
Symmetric Cryptography
(2007)
Eli Biham
,
Helena Handschuh
,
Stefan Lucks
,
Vincent Rijmen
07021 Abstracts Collection -- Symmetric Cryptography.
Symmetric Cryptography
(2007)
Gregory G. Rose
,
Philip Hawkes
,
Michael Paddon
,
Cameron McDonald
,
Miriam Wiggers de Vries
Design and Primitive Specification for Shannon.
Symmetric Cryptography
(2007)
Kaisa Nyberg
,
Risto M. Hakala
A Key-Recovery Attack on SOBER-128.
Symmetric Cryptography
(2007)
Tetsu Iwata
Tightness of the Security Bound of CENC.
Symmetric Cryptography
(2007)
David Arditti
,
Côme Berbain
,
Olivier Billet
,
Henri Gilbert
,
Jacques Patarin
QUAD: Overview and Recent Developments.
Symmetric Cryptography
(2007)
Eli Biham
,
Helena Handschuh
,
Stefan Lucks
,
Vincent Rijmen
07021 Executive Summary -- Symmetric Cryptography.
Symmetric Cryptography
(2007)
Alex Biryukov
Block and Stream Ciphers and the Creatures in Between.
Symmetric Cryptography
(2007)
Stefan Lucks
A Collision-Resistant Rate-1 Double-Block-Length Hash Function.
Symmetric Cryptography
(2007)
Nicolas T. Courtois
How Fast can be Algebraic Attacks on Block Ciphers?.
Symmetric Cryptography
(2007)
Erik Zenner
Why IV Setup for Stream Ciphers is Difficult.
Symmetric Cryptography
(2007)
volume 7021, 2007
Symmetric Cryptography, 07.01. - 12.01.2007
Symmetric Cryptography
7021 (2007)