Login / Signup
Symmetric Cryptography
2007
2009
2007
2009
Keyphrases
Publications
2009
Ewan Fleischmann
,
Christian Forler
,
Michael Gorski
Classification of the SHA-3 Candidates.
Symmetric Cryptography
(2009)
Sebastiaan Indesteege
,
Elena Andreeva
,
Christophe De Cannière
,
Orr Dunkelman
,
Emilia Käsper
,
Svetla Nikova
,
Bart Preneel
,
Elmar Tischhauser
The Lane hash function.
Symmetric Cryptography
(2009)
Guido Bertoni
,
Joan Daemen
,
Michaël Peeters
,
Gilles Van Assche
Sufficient conditions for sound tree hashing modes.
Symmetric Cryptography
(2009)
Helena Handschuh
,
Stefan Lucks
,
Bart Preneel
,
Phillip Rogaway
09031 Abstracts Collection - Symmetric Cryptography.
Symmetric Cryptography
(2009)
Praveen Gauravaram
,
Lars R. Knudsen
,
Krystian Matusiewicz
,
Florian Mendel
,
Christian Rechberger
,
Martin Schläffer
,
Søren S. Thomsen
Grøstl - a SHA-3 candidate.
Symmetric Cryptography
(2009)
Erik Zenner
Cache Timing Analysis of eStream Finalists.
Symmetric Cryptography
(2009)
Sebastiaan Indesteege
,
Bart Preneel
Practical Collisions for EnRUPT.
Symmetric Cryptography
(2009)
Guido Bertoni
,
Joan Daemen
,
Michaël Peeters
,
Gilles Van Assche
The Road from Panama to Keccak via RadioGatún.
Symmetric Cryptography
(2009)
Jorge Nakahara Jr.
,
Daniel Santana de Freitas
Mini-ciphers: a reliable testbed for cryptanalysis?
Symmetric Cryptography
(2009)
Orr Dunkelman
,
Eli Biham
The SHAvite-3 - A New Hash Function.
Symmetric Cryptography
(2009)
Anne Canteaut
,
María Naya-Plasencia
Internal collision attack on Maraca.
Symmetric Cryptography
(2009)
Matthias Krause
,
Dirk Stegemann
Algebraic Attacks against Linear RFID Authentication Protocols.
Symmetric Cryptography
(2009)
Helena Handschuh
,
Stefan Lucks
,
Bart Preneel
,
Phillip Rogaway
09031 Executive Summary - Symmetric Cryptography.
Symmetric Cryptography
(2009)
Jean-Philippe Aumasson
,
Itai Dinur
,
Willi Meier
,
Adi Shamir
Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium.
Symmetric Cryptography
(2009)
Sebastiaan Indesteege
,
Bart Preneel
Practical Preimages for Maraca.
Symmetric Cryptography
(2009)
Andrea Röck
,
Cédric Lauradoux
Parallel Generation of l-Sequences.
Symmetric Cryptography
(2009)
Miia Hermelin
,
Joo Yeon Cho
,
Kaisa Nyberg
Statistical Tests for Key Recovery Using Multidimensional Extension of Matsui's Algorithm 1.
Symmetric Cryptography
(2009)
Johannes Buchmann
,
Jintai Ding
,
Mohamed Saied Emam Mohamed
,
Wael Said Abd Elmageed Mohamed
MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis.
Symmetric Cryptography
(2009)
volume 9031, 2009
Symmetric Cryptography, 11.01. - 16.01.2009
Symmetric Cryptography
9031 (2009)