default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2008
- Jean-Philippe Aumasson, Simon Fischer, Shahram Khazaei, Willi Meier, Christian Rechberger:
New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba. FSE 2008: 470-488 - Jean-Philippe Aumasson, Willi Meier, Raphael C.-W. Phan:
The Hash Function Family LAKE. FSE 2008: 36-53 - Eli Biham:
New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru. FSE 2008: 444-461 - Eli Biham, Yaniv Carmeli:
Efficient Reconstruction of RC4 Keys from Internal States. FSE 2008: 270-288 - Eli Biham, Orr Dunkelman, Nathan Keller:
A Unified Approach to Related-Key Attacks. FSE 2008: 73-96 - Julio César Hernández Castro, Juan M. Estévez-Tapiador, Jean-Jacques Quisquater:
On the Salsa20 Core Function. FSE 2008: 462-469 - Debrup Chakraborty, Mridul Nandi:
An Improved Security Bound for HCTR. FSE 2008: 289-302 - Donghoon Chang, Mridul Nandi:
Improved Indifferentiability Security Analysis of chopMD Hash Function. FSE 2008: 429-443 - Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater:
Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent. FSE 2008: 382-397 - Nicolas T. Courtois, Gregory V. Bard, David A. Wagner:
Algebraic and Slide Attacks on KeeLoq. FSE 2008: 97-115 - Blandine Debraize, Louis Goubin:
Guess-and-Determine Algebraic Attack on the Self-Shrinking Generator. FSE 2008: 235-252 - Hüseyin Demirci, Ali Aydin Selçuk:
A Meet-in-the-Middle Attack on 8-Round AES. FSE 2008: 116-126 - Yedidya Hilewitz, Yiqun Lisa Yin, Ruby B. Lee:
Accelerating the Whirlpool Hash Function Using Parallel Table Lookup and Fast Cyclical Permutation. FSE 2008: 173-188 - Michal Hojsík, Bohuslav Rudolf:
Differential Fault Analysis of Trivium. FSE 2008: 158-172 - Seny Kamara, Jonathan Katz:
How to Encrypt with a Malicious Random Number Generator. FSE 2008: 303-315 - Patrick Lacharme:
Post-Processing Functions for a Biased Physical Random Number Generator. FSE 2008: 334-342 - Eunjin Lee, Donghoon Chang, Jongsung Kim, Jaechul Sung, Seokhie Hong:
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL. FSE 2008: 189-206 - Gaëtan Leurent:
MD4 is Not One-Way. FSE 2008: 412-428 - Vadim Lyubashevsky, Daniele Micciancio, Chris Peikert, Alon Rosen:
SWIFFT: A Modest Proposal for FFT Hashing. FSE 2008: 54-72 - Subhamoy Maitra, Goutam Paul:
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. FSE 2008: 253-269 - Stéphane Manuel, Thomas Peyrin:
Collisions on SHA-0 in One Hour. FSE 2008: 16-35 - Florian Mendel, Norbert Pramstaller, Christian Rechberger:
A (Second) Preimage Attack on the GOST Hash Function. FSE 2008: 224-234 - Ivica Nikolic, Alex Biryukov:
Collisions for Step-Reduced SHA-256. FSE 2008: 1-15 - Matthieu Rivain, Emmanuelle Dottax, Emmanuel Prouff:
Block Ciphers Implementations Provably Secure Against Second Order Side Channel Analysis. FSE 2008: 127-143 - Andrea Röck:
Entropy of the Internal State of an FCSR in Galois Representation. FSE 2008: 343-362 - Adi Shamir:
SQUASH - A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags. FSE 2008: 144-157 - Ron Steinfeld, Scott Contini, Krystian Matusiewicz, Josef Pieprzyk, Jian Guo, San Ling, Huaxiong Wang:
Cryptanalysis of LASH. FSE 2008: 207-223 - Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Teruo Saito, Tomoyasu Suzaki, Hiroyasu Kubo:
Impossible Differential Cryptanalysis of CLEFIA. FSE 2008: 398-411 - Kan Yasuda:
A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier. FSE 2008: 316-333 - Muhammad Reza Z'aba, Håvard Raddum, Matthew Henricksen, Ed Dawson:
Bit-Pattern Based Integral Attack. FSE 2008: 363-381
skipping 1 more match
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-12-20 21:35 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint