|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2043 occurrences of 632 keywords
|
|
|
Results
Found 3910 publication records. Showing 3909 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
113 | Chetan Nanjunda Mathur, Karthik Narayan, K. P. Subbalakshmi |
High Diffusion Cipher: Encryption and Error Correction in a Single Cryptographic Primitive. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Error correcting cipher, Joint error correction and encryption, Coding and cryptography, Block cipher, Error correcting code |
83 | Liting Zhang, Wenling Wu, Lei Zhang 0012, Yanjun Li |
A note on Cook's elastic block cipher. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
elastic block cipher, variable-input-length block cipher, encryption, block cipher, security model, pseudorandomness |
76 | Eric Filiol, Caroline Fontaine |
A New Ultrafast Stream Cipher Design: COS Ciphers. |
IMACC |
2001 |
DBLP DOI BibTeX RDF |
vectorized cipher, high speed encryption, Boolean functions, stream cipher, block cipher, nonlinear feedback shift register |
73 | Howard M. Heys |
Analysis of the Statistical Cipher Feedback Mode of Block Ciphers. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
block cipher modes, Cryptography, synchronization, stream ciphers, error propagation |
68 | Yang Xiao 0001, Hsiao-Hwa Chen, Xiaojiang Du, Mohsen Guizani |
Stream-based cipher feedback mode in wireless error channel. |
IEEE Trans. Wirel. Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
66 | Nathan Keller, Stephen D. Miller, Ilya Mironov, Ramarathnam Venkatesan |
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, stream cipher, random walks, expander graph |
64 | Bin Zhang 0003, Hongjun Wu 0001, Dengguo Feng, Hong Wang |
Weaknesses of COSvd (2, 128) Stream Cipher. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
COS cipher, Non- linear feedback shift register, Stream cipher, Divide-and-Conquer |
64 | Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman |
Is DES a Pure Cipher? (Results of More Cycling Experiments on DES). |
CRYPTO |
1985 |
DBLP DOI BibTeX RDF |
closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptography, cryptanalysis, Data Encryption Standard (DES), cryptology, multiple encryption, Birthday Paradox |
61 | Wen Ji, Lei Hu |
New Description of SMS4 by an Embedding overGF(28). |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
SMS4, ESMS4, XSL algorithm, block cipher, algebraic equation |
59 | Phillip Rogaway, Mihir Bellare, John Black |
OCB: A block-cipher mode of operation for efficient authenticated encryption. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
block-cipher usage, authenticity, cryptography, integrity, standards, encryption, AES, provable security, modes of operation |
58 | Côme Berbain, Olivier Billet, Anne Canteaut, Nicolas T. Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin, Hervé Sibert |
Sosemanuk, a Fast Software-Oriented Stream Cipher. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
58 | Ed Dawson, Matthew Henricksen, Leonie Simpson |
The Dragon Stream Cipher: Design, Analysis, and Implementation Issues. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Kazuhiko Minematsu |
Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
Block Cipher Mode, Birthday Bound, Tweakable Block Cipher |
56 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
Elastic block ciphers: method, security and instantiations. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Elastic block ciphers, Variable-length block ciphers, Reduction proof, Security analysis, Key recovery attacks |
56 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
The Security of Elastic Block Ciphers Against Key-Recovery Attacks. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Variable-length block ciphers, reduction proof, security analysis, key recovery attacks |
56 | Li-Wei Kang, Jin-Jang Leou, Shyi-Shiun Kuo, Wei-Chih Shen |
An error resilient image camouflaging scheme for secret image transmission. |
ISCAS (4) |
2005 |
DBLP DOI BibTeX RDF |
|
56 | Yuliang Zheng 0001, Tsutomu Matsumoto, Hideki Imai |
On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
54 | Chris Hall, David A. Wagner 0001, John Kelsey, Bruce Schneier |
Building PRFs from PRPs. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
cipher feedback mode, block ciphers, pseudo-random functions, pseudo-random permutations, concrete security |
54 | Jean-Sébastien Coron, Jacques Patarin, Yannick Seurin |
The Random Oracle Model and the Ideal Cipher Model Are Equivalent. |
CRYPTO |
2008 |
DBLP DOI BibTeX RDF |
|
54 | Julien Bringer, Hervé Chabanne, Emmanuelle Dottax |
Perturbing and Protecting a Traceable Block Cipher. |
Communications and Multimedia Security |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Meiqin Wang, Jorge Nakahara Jr., Yue Sun |
Cryptanalysis of the Full MMB Block Cipher. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
MMB block cipher, square cryptanalysis, differential cryptanalysis, modular multiplication, linear cryptanalysis |
52 | Nicolas T. Courtois, Sean O'Neil, Jean-Jacques Quisquater |
Practical Algebraic Attacks on the Hitag2 Stream Cipher. |
ISC |
2009 |
DBLP DOI BibTeX RDF |
Hitag 2 algorithm, MiFare Crypto-1 cipher, Gröbner bases, Boolean functions, stream ciphers, RFID tags, SAT solvers, algebraic cryptanalysis |
52 | Shuai Chen, XianXin Zhong, Zhengzhong Wu |
Chaos block cipher for wireless sensor network. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
discrete chaos, encryption function, single byte, wireless sensor network, block cipher |
52 | Like Chen, Runtong Zhang |
A Key-dependent Cipher DSDP. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Block cipher algorithm, DSDP structure |
52 | Jorge Nakahara Jr. |
3D: A Three-Dimensional Block Cipher. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
block cipher design, 3-dimensional state |
52 | Yaniv Shaked, Avishai Wool |
Cryptanalysis of the Bluetooth E0 Cipher Using OBDD's. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Stream cipher, Bluetooth, BDD |
52 | John Black |
The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
Information-Theoretic Cryptography, Uninstantiability, Random-Oracle Model, Ideal-Cipher Model |
52 | Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson |
ManTiCore: Encryption with Joint Cipher-State Authentication. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher |
52 | Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson |
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Alpha1, irregular clocking, divide and conquer attack, Cryptanalysis, stream cipher |
52 | Paul Crowley |
Mercy: A Fast Large Block Cipher for Disk Sector Encryption. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
disk sector, large block, avalanche, Mercy home page: http://www.cluefactory.org.uk/paul/mercy/ http://www.cluefactory.org.uk/paul/mercy/, state machine, Feistel cipher |
51 | Christophe De Cannière |
Trivium: A Stream Cipher Construction Inspired by Block Cipher Design Principles. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Changhoon Lee, Deukjo Hong, Sungjae Lee, Sangjin Lee 0002, Hyungjin Yang, Jongin Lim 0001 |
A Chosen Plaintext Linear Attack on Block Cipher CIKS-1. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
CIKS-1(Cipher with Internal Key Scheduling), Block Cipher, Linear Cryptanalysis, Data-Dependent Permutation |
49 | Gautham Sekar, Bart Preneel |
Improved Distinguishing Attacks on HC-256. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
|
49 | Debra L. Cook, Moti Yung, Angelos D. Keromytis |
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
security analysis, differential cryptanalysis, linear cryptanalysis |
49 | Xuejia Lai, James L. Massey, Sean Murphy |
Markov Ciphers and Differential Cryptanalysis. |
EUROCRYPT |
1991 |
DBLP DOI BibTeX RDF |
|
49 | Cees J. A. Jansen, Tor Helleseth, Alexander Kholosha |
Cascade Jump Controlled Sequence Generator and Pomaranch Stream Cipher. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
jump register, stream cipher, Pomaranch |
47 | Côme Berbain, Henri Gilbert |
On the Security of IV Dependent Stream Ciphers. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
IV setup, stream cipher, provable security, PRNG |
47 | Yunyi Liu, Tuanfa Qin, Wansun Ni, Shuyi Zhang |
Cryptanalysis of the Energy Efficient Stream Ciphers SSC2. |
MADNES |
2005 |
DBLP DOI BibTeX RDF |
improved Guess-and-Determine attack, fast stream cipher, SSC2, wireless sensor networks, Cryptanalysis |
47 | Debra L. Cook, Angelos D. Keromytis |
Conversion and Proxy Functions for Symmetric Key Ciphers. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
Symmetric Key Cipher Design, Functional Composition, Proxy Cryptography |
47 | Helger Lipmaa |
Fast Software Implementations of SC2000. |
ISC |
2002 |
DBLP DOI BibTeX RDF |
Block cipher design, large S-boxes, SC2000, fast implementation |
47 | Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki |
A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher. |
IEEE Trans. Inf. Theory |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann |
Analysis of the SMS4 Block Cipher. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
UFN, cryptanalysis, block ciphers, algebraic structure |
47 | Raphael C.-W. Phan, Mohammad Umar Siddiqi |
A Framework for Describing Block Cipher Cryptanalysis. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
framework, cryptanalysis, generalization, Encryption, block ciphers, distinguishers |
47 | Yevgeniy Dodis, Prashant Puniya |
On the Relation Between the Ideal Cipher and the Random Oracle Models. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Chin Mun Wee, Peter R. Sutton, Neil W. Bergmann, John A. Williams 0001 |
Multi Stream Cipher Architecture for Reconfigurable System-on-Chip. |
FPL |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Maryam Arvandi, Shuwei Wu, Alireza Sadeghian, William W. Melek, Isaac Woungang |
Symmetric Cipher Design Using Recurrent Neural Networks. |
IJCNN |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Craig Gentry, Zulfikar Ramzan |
Eliminating Random Permutation Oracles in the Even-Mansour Cipher. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
47 | Olivier Billet, Henri Gilbert |
A Traceable Block Cipher. |
ASIACRYPT |
2003 |
DBLP DOI BibTeX RDF |
Matsumoto-Imai, multivariate cryptology, symmetric cryptology, block ciphers, traitor tracing, collusion resistance |
47 | John Black, Phillip Rogaway |
A Block-Cipher Mode of Operation for Parallelizable Message Authentication. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
47 | Hongjun Wu |
Related-Cipher Attacks. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
|
47 | Phillip Rogaway, Mihir Bellare, John Black, Ted Krovetz |
OCB: a block-cipher mode of operation for efficient authenticated encryption. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
authenticity, cryptography, integrity, standards, encryption, block ciphers, AES, provable security, modes of operation |
47 | Paul Crowley, Stefan Lucks |
Bias in the LEVIATHAN Stream Cipher. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
47 | Serge Vaudenay |
On the Security of CS-Cipher. |
FSE |
1999 |
DBLP DOI BibTeX RDF |
|
47 | Ueli M. Maurer |
A Provably-Secure Strongly-Randomized Cipher. |
EUROCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
46 | Cipher A. Deavours |
A Ku Klux Klan Cipher. |
Cryptologia |
1989 |
DBLP DOI BibTeX RDF |
|
46 | Cipher A. Deavours, Brian J. Winkel |
Cryptanalysis of Shift Stream Generated Stream Cipher Systems - Book Review. |
Cryptologia |
1984 |
DBLP DOI BibTeX RDF |
|
45 | Ahmed Y. Mahmoud, Alexander G. Chefranov |
Hill cipher modification based on eigenvalues HCM-EE. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
dynamic key, eiqenvalue, hill cipher, exponentiation, matrix, image encryption, pseudorandom number |
45 | Dai Watanabe, Kota Ideguchi, Jun Kitahara, Kenichiro Muto, Hiroki Furuichi, Toshinobu Kaneko |
Enocoro-80: A Hardware Oriented Stream Cipher. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Panama, stream cipher |
45 | Orr Dunkelman, Nathan Keller |
A New Attack on the LEX Stream Cipher. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
stream cipher design, AES, LEX |
45 | Bin Zhang 0003, Dengguo Feng |
Security analysis of a new stream cipher. |
Sci. China Ser. F Inf. Sci. |
2006 |
DBLP DOI BibTeX RDF |
divide-and-conquer attack, non-linear feedback shift registers (NLFSR), stream cipher, chaotic sequence |
45 | Bonwook Koo, Hwan Seok Jang, Jung Hwan Song |
On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher. |
ICISC |
2006 |
DBLP DOI BibTeX RDF |
diffusion layer, SPN, Block cipher, binary matrix |
45 | Sang-Hyun Park, Hoon Choi, Sang-Han Lee, Taejoo Chang |
The High-Speed Packet Cipher System Suitable for Small Sized Data. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
Packet Cipher, SoC(System on Chip), Cryptographic module, Security API |
45 | Palash Sarkar 0001 |
Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
stream cipher, cellular automata, self-synchronization |
45 | Dong Hyeon Cheon, Sangjin Lee 0002, Jong In Lim 0001, Sung Jae Lee |
New Block Cipher DONUT Using Pairwise Perfect Decorrelation. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
Differential Cryptanalysis (DC), Linear Cryptanalysis (LC), Block cipher, Decorrelation |
43 | Bao Ngoc Tran, Thuc Dinh Nguyen |
Modular Matrix Cipher and Its Application in Authentication Protocol. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
Modular Matrix Algebra, Matrix Cipher, Hill Cipher, Authentication, Hamiltonian Cycle |
42 | Mridul Nandi |
Fast and Secure CBC-Type MAC Algorithms. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
OMAC, padding rule, prf-security, CBC-MAC |
42 | Haifeng Qian, Zhibin Li 0005, Zhijie Chen, Siman Yang |
A Practical Optimal Padding for Signature Schemes. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Ramesh Karri, Grigori Kuznetsov, Michael Gössel |
Parity-Based Concurrent Error Detection in Symmetric Block Ciphers. |
ITC |
2003 |
DBLP DOI BibTeX RDF |
|
42 | Mihir Bellare, Phillip Rogaway |
On the Construction of Variable-Input-Length Ciphers. |
FSE |
1999 |
DBLP DOI BibTeX RDF |
Provable Security, Modes of Operation, Symmetric Encryption, Ciphers |
42 | William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan |
Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
cascaded ciphers, Shannon model, Double DES, information theory, DES, Ciphers, meet in the middle attacks |
42 | Martin Boesgaard, Mette Vesterager, Erik Zenner |
The Rabbit Stream Cipher. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
Stream cipher, coupled, non-linear, counter, fast |
42 | Danilo Gligoroski, Smile Markovski, Svein J. Knapskog |
The Stream Cipher Edon80. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
synchronous stream cipher, quasigroup, quasigroup string transformations, hardware, Latin square |
40 | Antoine Joux, Jean-René Reinhard |
Overtaking VEST. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
inner collision, chosen IV attack, Stream cipher |
40 | Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum |
An Analysis of the Hermes8 Stream Ciphers. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
Hermes8, Cryptanalysis, Stream Cipher |
40 | HyungSo Yoo, ChangKyun Kim, JaeCheol Ha, Sang-Jae Moon, IlHwan Park |
Side Channel Cryptanalysis on SEED. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
Fault insertion analysis, block cipher, Side channel attack, Differential power analysis, SEED |
40 | Hitoshi Yanami, Takeshi Shimoyama |
Differential Cryptanalysis of a Reduced-Round SEED. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
symmetric block cipher, probability, differential attack, characteristic, SEED |
40 | Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mahmud, Muhammad Khurram Khan |
Bio-chaotic Stream Cipher-Based Iris Image Encryption. |
CSE (2) |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Jiali Choy, Huihui Yap |
Impossible Boomerang Attack for Block Cipher Structures. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
Impossible Boomerang Attack, Impossible Boomerang Distinguishers, Block Ciphers |
40 | Devesh C. Jinwala, Dhiren R. Patel, Kankar S. Dasgupta |
Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Authentication, Encryption, Block Ciphers, Link Layer Security |
40 | Christophe De Cannière, Bart Preneel |
Trivium. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Matthew Robshaw |
The eSTREAM Project. |
The eSTREAM Finalists |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Souradyuti Paul, Bart Preneel, Gautham Sekar |
Distinguishing Attacks on the Stream Cipher Py. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Shee-Yau Wu, Shih-Chuan Lu, Chi-Sung Laih |
Design of AES Based on Dual Cipher and Composite Field. |
CT-RSA |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Jongsung Kim, Seokhie Hong, Jaechul Sung, Changhoon Lee, Sangjin Lee 0002 |
Impossible Differential Cryptanalysis for Block Cipher Structures. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Shai Halevi, Don Coppersmith, Charanjit S. Jutla |
Scream: A Software-Efficient Stream Cipher. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
Round functions, Stream ciphers, Block ciphers, SEAL |
40 | Kouichi Sakurai, Yuliang Zheng 0001 |
Cryptographic Weaknesses in the Round Transformation Used in a Block Cipher with Provable Immunity Against Linear Cryptanalysis (Extended Abstract). |
ISAAC |
1996 |
DBLP DOI BibTeX RDF |
|
40 | Mitsuru Matsui |
Linear Cryptanalysis Method for DES Cipher. |
EUROCRYPT |
1993 |
DBLP DOI BibTeX RDF |
|
38 | Ewan Fleischmann, Michael Gorski, Stefan Lucks |
On the Security of Tandem-DM. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
block cipher based, double-block length, Tandem-DM, Cryptographic hash function, ideal cipher model, proof of security |
38 | Ewan Fleischmann, Michael Gorski, Stefan Lucks |
Security of Cyclic Double Block Length Hash Functions. |
IMACC |
2009 |
DBLP DOI BibTeX RDF |
block cipher based, double-block length, Cyclic-DM, Abreast-DM, cryptographic hash function, ideal cipher model, proof of security |
38 | Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, Mohammad Abdul Matin 0001 |
Effect of Security Increment to Symmetric Data Encryption through AES Methodology. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
plain text, cipher text, Block cipher, Computer Security, Differential cryptanalysis, Linear cryptanalysis, Symmetric Encryption |
38 | Claude Carlet |
On the Higher Order Nonlinearities of Algebraic Immune Functions. |
CRYPTO |
2006 |
DBLP DOI BibTeX RDF |
higher order nonlinearity, Boolean function, stream cipher, block cipher, algebraic attack, algebraic immunity, algebraic degree |
38 | Phillip Rogaway, Don Coppersmith |
A Software-Optimized Encryption Algorithm. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
Fast encryption, Pseudorandom functionlinebreak[4] family, Software encryption, Fast encryption, Pseudorandom functionlinebreak[4] family, Software encryption, Cryptography, Cryptography, Stream cipher, Stream cipher, Encryption, Encryption, Key words |
38 | Burton S. Kaliski Jr., Ronald L. Rivest, Alan T. Sherman |
Is the Data Encryption Standard a Group? (Preliminary Abstract). |
EUROCRYPT |
1985 |
DBLP DOI BibTeX RDF |
closed cipher, cycle-detection algorithm, finite permutation group, idempotent cryptosystem, pure cipher, cryptanalysis, Data Encryption Standard (DES), multiple encryption, Birthday Paradox |
38 | Shrikant Ojha, Naveen Kumar 0001, Kritika Jain, Sangeeta Lal |
TWIS - A Lightweight Block Cipher. |
ICISS |
2009 |
DBLP DOI BibTeX RDF |
S-Box, Cipher, lightweight cryptography, CLEFIA |
38 | Lei Zhang 0012, Wentao Zhang, Wenling Wu |
Cryptanalysis of Reduced-Round SMS4 Block Cipher. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
SMS4, Differential characteristic, Block cipher, Differential cryptanalysis, Rectangle attack |
38 | Camel Tanougast, Serge Weber, Gilles Millerioux, Jamal Daafouz, Ahmed Bouridane |
VLSI Architecture and FPGA Implementation of a Hybrid Message-Embedded Self-Synchronizing Stream Cipher. |
DELTA |
2008 |
DBLP DOI BibTeX RDF |
Cryptography system, self-synchronising stream cipher, FPGA, VLSI design |
38 | Yukiyasu Tsunoo, Teruo Saito, Hiroyasu Kubo, Tomoyasu Suzaki |
Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
key-dependent S-box, Mir-1, stream cipher, eSTREAM, key recovery attack |
38 | Shin-Yi Lin, Chih-Tsun Huang |
A High-Throughput Low-Power AES Cipher for Network Applications. |
ASP-DAC |
2007 |
DBLP DOI BibTeX RDF |
0.13 micron, low-power AES cipher, two-stage pipeline, CCM mode, design-for-test circuitry, 4.27 Gbits/s, 333 MHz, 40.9 mW, CMOS technology, network applications |
38 | Yuan-man Tong, Zhiying Wang 0003, Kui Dai, Hongyi Lu |
Designing Power Analysis Resistant and High Performance Block Cipher Coprocessor Using WDDL and Wave-Pipelining. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
WDDL, power analysis resistant, block cipher, design flow, Wave-pipelining |
38 | Hoon-Jae Lee 0001 |
Highly Reliable Synchronous Stream Cipher System for Link Encryption. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
synchronization, stream cipher, randomness, Keystream |
Displaying result #1 - #100 of 3909 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|