|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 24 occurrences of 18 keywords
|
|
|
Results
Found 39 publication records. Showing 39 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
160 | Jongsung Kim, Raphael C.-W. Phan |
A Cryptanalytic View of the NSA's Skipjack Block Cipher Design. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Skipjack, NSA, Cryptanalysis, Block Ciphers, Distinguisher |
131 | Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee 0002, Jongin Lim 0001 |
Saturation Attacks on Reduced Round Skipjack. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
|
131 | Lars R. Knudsen, Matthew J. B. Robshaw, David A. Wagner 0001 |
Truncated Differentials and Skipjack. |
CRYPTO |
1999 |
DBLP DOI BibTeX RDF |
|
119 | Eli Biham, Alex Biryukov, Adi Shamir |
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. |
J. Cryptol. |
2005 |
DBLP DOI BibTeX RDF |
Skipjack, Yoyo game, Adaptive attacks, Cryptanalysis, Differential cryptanalysis, Impossible differentials |
99 | Eli Biham, Alex Biryukov, Adi Shamir |
Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. |
EUROCRYPT |
1999 |
DBLP DOI BibTeX RDF |
Skipjack, Cryptanalysis, Differential cryptanalysis, Impossible differentials |
69 | Ben Reichardt, David A. Wagner 0001 |
Markov Truncated Differential Cryptanalysis of Skipjack. |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
69 | Louis Granboulan |
Flaws in Differential Cryptanalysis of Skipjack. |
FSE |
2001 |
DBLP DOI BibTeX RDF |
|
57 | Eli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir |
Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. |
Selected Areas in Cryptography |
1998 |
DBLP DOI BibTeX RDF |
|
50 | Jeremy Epstein, Tim Williams |
Using Fortezza For Transparent File Encryption. |
ACSAC |
1996 |
DBLP DOI BibTeX RDF |
Fortezza, transparent file encryption, SISTex, Assure Basic product, security features, DOS/Windows environment, DES based file encryption, Fortezza card, Skipjack algorithm, technical problems, access controls, cryptography, Data Encryption Standard, product development |
49 | Jaechul Sung, Sangjin Lee 0002, Jong In Lim 0001, Seokhie Hong, Sangjoon Park |
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Khumbelo Difference Muthavhine, Mbuyu Sumbwanyambe |
Using the Muthavhine Function to Modify Skipjack Algorithm to Prevent LC and DC Attacks on IoT Devices. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
28 | Mukti Zainuddin, Safruddin Safruddin, Aisjah Farhum, Budimawan Budimawan, Rachmat Hidayat, Muhammad Banda Selamat, Eko Sri Wiyono, Muhammad Ridwan, Mega Syamsuddin, Yudi Nurul Ihsan |
Satellite-Based Ocean Color and Thermal Signatures Defining Habitat Hotspots and the Movement Pattern for Commercial Skipjack Tuna in Indonesia Fisheries Management Area 713, Western Tropical Pacific. |
Remote. Sens. |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Tung-Yao Hsu, Yi Chang 0001, Ming-An Lee, Ren-Fen Wu, Shih-Chun Hsiao |
Predicting Skipjack Tuna Fishing Grounds in the Western and Central Pacific Ocean Based on High-Spatial-Temporal-Resolution Satellite Data. |
Remote. Sens. |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Robinson Mugo, Sei-Ichi Saitoh |
Ensemble Modelling of Skipjack Tuna (Katsuwonus pelamis) Habitats in the Western North Pacific Using Satellite Remotely Sensed Data; a Comparative Analysis Using Machine-Learning Models. |
Remote. Sens. |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Jiyan Zhang, Ting Cui, Chenhui Jin |
Structural Attack on Reduced-Round Skipjack. |
IEEE Access |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Tung-Yao Hsu, Yi Chang 0001 |
Modeling the habitat suitability index of skipjack tuna (katsuwonus pelamis) in the western and central pacific ocean. |
IGARSS |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun 0001, Long Wen, Andrey Bogdanov |
Integrals go Statistical: Cryptanalysis of Full Skipjack Variants. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
28 | Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun 0001, Long Wen, Andrey Bogdanov |
Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants. |
FSE |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Céline Blondeau, Andrey Bogdanov, Meiqin Wang |
On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers. |
ACNS |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Ting Cui, Chenhui Jin, Guoshuang Zhang |
Observations of Skipjack-like Structure with SP/SPS Round Function. |
J. Univers. Comput. Sci. |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Alex Biryukov |
Skipjack. |
Encyclopedia of Cryptography and Security (2nd Ed.) |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Jia Hao Kong, Li-Minn Ang, Kah Phooi Seng, Fong Tien Ong |
Low-complexity Two Instruction Set Computer architecture for sensor network using Skipjack encryption. |
ICOIN |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Jongsung Kim, Raphael C.-W. Phan |
Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher. |
Cryptologia |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Alex Biryukov |
Skipjack. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Seokhie Hong, Jaechul Sung, Sangjin Lee 0002, Jongin Lim 0001, Jongsu Kim |
Provable security for 13 round Skipjack-like structure. |
Inf. Process. Lett. |
2002 |
DBLP DOI BibTeX RDF |
|
28 | Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle |
Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher. |
IACR Cryptol. ePrint Arch. |
2002 |
DBLP BibTeX RDF |
|
28 | Lars R. Knudsen, David A. Wagner 0001 |
On the structure of Skipjack. |
Discret. Appl. Math. |
2001 |
DBLP DOI BibTeX RDF |
|
28 | Louis Granboulan |
Flaws in differential cryptanalysis of Skipjack. |
IACR Cryptol. ePrint Arch. |
2001 |
DBLP BibTeX RDF |
|
28 | Russell Housley, Peter E. Yee, William Nace |
Encryption using KEA and SKIPJACK. |
RFC |
2000 |
DBLP DOI BibTeX RDF |
|
28 | John Pawling |
Use of the KEA and SKIPJACK Algorithms in CMS. |
RFC |
2000 |
DBLP DOI BibTeX RDF |
|
28 | Russell Housley, Todd Horting, Peter E. Yee |
TELNET Authentication Using KEA and SKIPJACK. |
RFC |
2000 |
DBLP DOI BibTeX RDF |
|
20 | António Grilo 0001, Krzysztof Piotrowski, Peter Langendörfer, Augusto Casaca |
A Wireless Sensor Network Architecture for Homeland Security Application. |
ADHOC-NOW |
2009 |
DBLP DOI BibTeX RDF |
Reliable Transport, Wireless Sensor Networks, Routing, Distributed Shared Memory, Homeland Security |
20 | Devesh C. Jinwala, Dhiren R. Patel, Kankar S. Dasgupta |
Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Authentication, Encryption, Block Ciphers, Link Layer Security |
20 | Eric Whitman Smith, David L. Dill |
Automatic Formal Verification of Block Cipher Implementations. |
FMCAD |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Jens Mache, Chris Allick |
The Cost of Preserving Privacy: Performance Measurements of RFID Pseudonym Protocols. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Alfonso Iglesias, Bernardino Arcay Varela, José Manuel Cotos, José A. Taboada 0001, Carlos Dafonte |
A comparison between functional networks and artificial neural networks for the prediction of fishing catches. |
Neural Comput. Appl. |
2004 |
DBLP DOI BibTeX RDF |
Functional network, Artificial neural network (ANN), Remote sensing |
20 | David Naccache, Adi Shamir, Julien P. Stern |
How to Copyright a Function? |
Public Key Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Eli Biham, Alex Biryukov, Adi Shamir |
Miss in the Middle Attacks on IDEA and Khufu. |
FSE |
1999 |
DBLP DOI BibTeX RDF |
|
20 | Eli Biham, Adi Shamir |
Differential Fault Analysis of Secret Key Cryptosystems. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #39 of 39 (100 per page; Change: )
|
|