The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Skipjack with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-2002 (18) 2004-2016 (15) 2017-2024 (6)
Publication types (Num. hits)
article(17) incollection(2) inproceedings(20)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 24 occurrences of 18 keywords

Results
Found 39 publication records. Showing 39 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
160Jongsung Kim, Raphael C.-W. Phan A Cryptanalytic View of the NSA's Skipjack Block Cipher Design. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Skipjack, NSA, Cryptanalysis, Block Ciphers, Distinguisher
131Kyungdeok Hwang, Wonil Lee, Sungjae Lee, Sangjin Lee 0002, Jongin Lim 0001 Saturation Attacks on Reduced Round Skipjack. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
131Lars R. Knudsen, Matthew J. B. Robshaw, David A. Wagner 0001 Truncated Differentials and Skipjack. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
119Eli Biham, Alex Biryukov, Adi Shamir Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. Search on Bibsonomy J. Cryptol. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Skipjack, Yoyo game, Adaptive attacks, Cryptanalysis, Differential cryptanalysis, Impossible differentials
99Eli Biham, Alex Biryukov, Adi Shamir Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Skipjack, Cryptanalysis, Differential cryptanalysis, Impossible differentials
69Ben Reichardt, David A. Wagner 0001 Markov Truncated Differential Cryptanalysis of Skipjack. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
69Louis Granboulan Flaws in Differential Cryptanalysis of Skipjack. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
57Eli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
50Jeremy Epstein, Tim Williams Using Fortezza For Transparent File Encryption. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Fortezza, transparent file encryption, SISTex, Assure Basic product, security features, DOS/Windows environment, DES based file encryption, Fortezza card, Skipjack algorithm, technical problems, access controls, cryptography, Data Encryption Standard, product development
49Jaechul Sung, Sangjin Lee 0002, Jong In Lim 0001, Seokhie Hong, Sangjoon Park Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28Khumbelo Difference Muthavhine, Mbuyu Sumbwanyambe Using the Muthavhine Function to Modify Skipjack Algorithm to Prevent LC and DC Attacks on IoT Devices. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
28Mukti Zainuddin, Safruddin Safruddin, Aisjah Farhum, Budimawan Budimawan, Rachmat Hidayat, Muhammad Banda Selamat, Eko Sri Wiyono, Muhammad Ridwan, Mega Syamsuddin, Yudi Nurul Ihsan Satellite-Based Ocean Color and Thermal Signatures Defining Habitat Hotspots and the Movement Pattern for Commercial Skipjack Tuna in Indonesia Fisheries Management Area 713, Western Tropical Pacific. Search on Bibsonomy Remote. Sens. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Tung-Yao Hsu, Yi Chang 0001, Ming-An Lee, Ren-Fen Wu, Shih-Chun Hsiao Predicting Skipjack Tuna Fishing Grounds in the Western and Central Pacific Ocean Based on High-Spatial-Temporal-Resolution Satellite Data. Search on Bibsonomy Remote. Sens. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Robinson Mugo, Sei-Ichi Saitoh Ensemble Modelling of Skipjack Tuna (Katsuwonus pelamis) Habitats in the Western North Pacific Using Satellite Remotely Sensed Data; a Comparative Analysis Using Machine-Learning Models. Search on Bibsonomy Remote. Sens. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Jiyan Zhang, Ting Cui, Chenhui Jin Structural Attack on Reduced-Round Skipjack. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Tung-Yao Hsu, Yi Chang 0001 Modeling the habitat suitability index of skipjack tuna (katsuwonus pelamis) in the western and central pacific ocean. Search on Bibsonomy IGARSS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun 0001, Long Wen, Andrey Bogdanov Integrals go Statistical: Cryptanalysis of Full Skipjack Variants. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
28Meiqin Wang, Tingting Cui, Huaifeng Chen, Ling Sun 0001, Long Wen, Andrey Bogdanov Integrals Go Statistical: Cryptanalysis of Full Skipjack Variants. Search on Bibsonomy FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Céline Blondeau, Andrey Bogdanov, Meiqin Wang On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers. Search on Bibsonomy ACNS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Ting Cui, Chenhui Jin, Guoshuang Zhang Observations of Skipjack-like Structure with SP/SPS Round Function. Search on Bibsonomy J. Univers. Comput. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
28Alex Biryukov Skipjack. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Jia Hao Kong, Li-Minn Ang, Kah Phooi Seng, Fong Tien Ong Low-complexity Two Instruction Set Computer architecture for sensor network using Skipjack encryption. Search on Bibsonomy ICOIN The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Jongsung Kim, Raphael C.-W. Phan Advanced Differential-Style Cryptanalysis of the NSA's Skipjack Block Cipher. Search on Bibsonomy Cryptologia The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Alex Biryukov Skipjack. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Seokhie Hong, Jaechul Sung, Sangjin Lee 0002, Jongin Lim 0001, Jongsu Kim Provable security for 13 round Skipjack-like structure. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
28Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle Square Attacks on Reduced-Round Variants of the Skipjack Block Cipher. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
28Lars R. Knudsen, David A. Wagner 0001 On the structure of Skipjack. Search on Bibsonomy Discret. Appl. Math. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
28Louis Granboulan Flaws in differential cryptanalysis of Skipjack. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2001 DBLP  BibTeX  RDF
28Russell Housley, Peter E. Yee, William Nace Encryption using KEA and SKIPJACK. Search on Bibsonomy RFC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28John Pawling Use of the KEA and SKIPJACK Algorithms in CMS. Search on Bibsonomy RFC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
28Russell Housley, Todd Horting, Peter E. Yee TELNET Authentication Using KEA and SKIPJACK. Search on Bibsonomy RFC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20António Grilo 0001, Krzysztof Piotrowski, Peter Langendörfer, Augusto Casaca A Wireless Sensor Network Architecture for Homeland Security Application. Search on Bibsonomy ADHOC-NOW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Reliable Transport, Wireless Sensor Networks, Routing, Distributed Shared Memory, Homeland Security
20Devesh C. Jinwala, Dhiren R. Patel, Kankar S. Dasgupta Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Authentication, Encryption, Block Ciphers, Link Layer Security
20Eric Whitman Smith, David L. Dill Automatic Formal Verification of Block Cipher Implementations. Search on Bibsonomy FMCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Jens Mache, Chris Allick The Cost of Preserving Privacy: Performance Measurements of RFID Pseudonym Protocols. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Alfonso Iglesias, Bernardino Arcay Varela, José Manuel Cotos, José A. Taboada 0001, Carlos Dafonte A comparison between functional networks and artificial neural networks for the prediction of fishing catches. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Functional network, Artificial neural network (ANN), Remote sensing
20David Naccache, Adi Shamir, Julien P. Stern How to Copyright a Function? Search on Bibsonomy Public Key Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Eli Biham, Alex Biryukov, Adi Shamir Miss in the Middle Attacks on IDEA and Khufu. Search on Bibsonomy FSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Eli Biham, Adi Shamir Differential Fault Analysis of Secret Key Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #39 of 39 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license