C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
WEWoRC
2005
2007
2010
2012
2005
2012
Keyphrases
Publications
volume 7242, 2012
Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers
WEWoRC
7242 (2012)
2011
Erik Tews
,
Julian Wälde
,
Michael Weiner
Breaking DVB-CSA.
WEWoRC
(2011)
Marián Kühnel
RSA Vulnerabilities with Small Prime Difference.
WEWoRC
(2011)
Onur Koçak
,
Nese Öztop
Cryptanalysis of TWIS Block Cipher.
WEWoRC
(2011)
Michelle Kendall
,
Keith M. Martin
On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks.
WEWoRC
(2011)
Robert Niebuhr
,
Pierre-Louis Cayrel
Broadcast Attacks against Code-Based Schemes.
WEWoRC
(2011)
Xinxin Fan
,
Guang Gong
On the Security of Hummingbird-2 against Side Channel Cube Attacks.
WEWoRC
(2011)
Timo Bartkewitz
,
Tim Güneysu
Full Lattice Basis Reduction on Graphics Cards.
WEWoRC
(2011)
Aysajan Abidin
,
Jan-Åke Larsson
New Universal Hash Functions.
WEWoRC
(2011)
Zoya Dyka
,
Peter Langendörfer
,
Frank Vater
Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2 k ).
WEWoRC
(2011)
Ewan Fleischmann
,
Christian Forler
,
Stefan Lucks
Γ-MAC[H, P] - A New Universal MAC Scheme.
WEWoRC
(2011)
volume 4945, 2008
Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers
WEWoRC
4945 (2008)
2007
Rei Yoshida
,
Rie Shigetomi
,
Kazuki Yoshizoe
,
Akira Otsuka
,
Hideki Imai
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services.
WEWoRC
(2007)
Michael Beiter
Combiner Driven Management Models and Their Applications.
WEWoRC
(2007)
Sebastiaan Indesteege
,
Bart Preneel
Preimages for Reduced-Round Tiger.
WEWoRC
(2007)
Marko Hölbl
,
Christian Rechberger
,
Tatjana Welzer
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256.
WEWoRC
(2007)
Tim Güneysu
,
Christof Paar
,
Sven Schäge
Efficient Hash Collision Search Strategies on Special-Purpose Hardware.
WEWoRC
(2007)
Rupert J. Hartung
Cryptography Based on Quadratic Forms: Complexity Considerations.
WEWoRC
(2007)
María Naya-Plasencia
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation.
WEWoRC
(2007)
Anja Korsten
Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups.
WEWoRC
(2007)
Gautham Sekar
,
Souradyuti Paul
,
Bart Preneel
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B.
WEWoRC
(2007)
Léonard Dallot
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme.
WEWoRC
(2007)
Waldyr D. Benits Junior
,
Steven D. Galbraith
The GPS Identification Scheme Using Frobenius Expansions.
WEWoRC
(2007)
Nicolas T. Courtois
,
Blandine Debraize
Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts.
WEWoRC
(2007)
2005
Adil Alsaid
,
Chris J. Mitchell
A Scanning Tool for PC Root Public Key Stores.
WEWoRC
(2005)
WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium
WEWoRC
(2005)
Jaechul Sung
,
Jongsung Kim
,
Changhoon Lee
,
Seokhie Hong
Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds.
WEWoRC
(2005)
Frederik Armknecht
Algebraic Attacks and Annihilators.
WEWoRC
(2005)
Heiko Stamer
Efficient Electronic Gambling: An Extended Implementation of the Toolbox for Mental Card Games.
WEWoRC
(2005)
Marie Virat
[epsilon].
WEWoRC
(2005)
Alexandre Ruiz
,
Jorge Luis Villar
Publicly Verfiable Secret Sharing from Paillier's Cryptosystem.
WEWoRC
(2005)
Cédric Lauradoux
Collision attacks on processors with cache and countermeasures.
WEWoRC
(2005)
Stefan Lucks
,
Nico Schmoigl
,
Emin Islam Tatli
Issues on Designing a Cryptographic Compiler.
WEWoRC
(2005)
Andrey Sidorenko
,
Berry Schoenmakers
State Recovery Attacks on Pseudorandom Generators.
WEWoRC
(2005)
Eabhnat Ní Fhloinn
,
Michael Purser
Applications of Hiding in RSA.
WEWoRC
(2005)
Krystian Matusiewicz
,
Josef Pieprzyk
,
Norbert Pramstaller
,
Christian Rechberger
,
Vincent Rijmen
Analysis of simplified variants of SHA-256.
WEWoRC
(2005)
SeongHan Shin
,
Kazukuni Kobara
,
Hideki Imai
A Secure Network Storage System with Information Privacy.
WEWoRC
(2005)