The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for blockcipher with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1985-2005 (15) 2006-2008 (22) 2009-2010 (15) 2011-2013 (16) 2014-2017 (19) 2018-2024 (14)
Publication types (Num. hits)
article(39) inproceedings(61) phdthesis(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 62 occurrences of 29 keywords

Results
Found 101 publication records. Showing 101 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
152Peng Wang 0009, Dengguo Feng, Wenling Wu HCTR: A Variable-Input-Length Enciphering Mode. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF disk sector encryption, modes of operation, symmetric encryption, Blockcipher, tweakable blockcipher
136John Black, Martin Cochran, Thomas Shrimpton On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Blockcipher-based hash functions, Provable security, Ideal-cipher model, Tweakable blockciphers, Collision-resistant hash functions
117Peng Wang 0009, Dengguo Feng, Wenling Wu On the Security of Tweakable Modes of Operation: TBC and TAE. Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF modes of operation, authenticated encryption, symmetric encryption, Blockcipher, tweakable blockcipher
112John Black, Martin Cochran, Thomas Shrimpton On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF provable security, tweakable blockciphers, Collision-resistant hash functions
87Phillip Rogaway Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
83Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata The 128-Bit Blockcipher CLEFIA (Extended Abstract). Search on Bibsonomy FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF generalized Feistel structure, DSM, blockcipher, CLEFIA
82Peng Wang 0009, Dengguo Feng, Wenling Wu, Liting Zhang On the Unprovable Security of 2-Key XCBC. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Blockcipher mode of operation, Provable security, Message authentication code, Related-key attack, Blockcipher
82Peng Wang 0009, Dengguo Feng, Wenling Wu Symmetric Nonce Respecting Security Model and the MEM Mode of Operation. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF nonce-based encryption, security model, modes of operation, Blockcipher, tweakable blockcipher
77Martijn Stam Blockcipher-Based Hashing Revisited. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
77John Black The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Information-Theoretic Cryptography, Uninstantiability, Random-Oracle Model, Ideal-Cipher Model
60Tetsu Iwata New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
52Tetsu Iwata, Kan Yasuda BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Bivariate, random-until-bad game, systematic proof, universal hash function, counter mode
52Tetsu Iwata, Kan Yasuda HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. Search on Bibsonomy FSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SIV, Universal hash function, security proof, counter mode
52Kazuhiko Minematsu, Toshiyasu Matsushima Tweakable Enciphering Schemes from Hash-Sum-Expansion. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF HCTR, HCH, Weak Pseudorandom Function, Mode of operation
49Kazuhiko Minematsu Building blockcipher from small-block tweakable blockcipher. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
49Kazuhiko Minematsu, Tetsu Iwata Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal. Search on Bibsonomy IMACC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
42Jean-Philippe Aumasson, Raphael C.-W. Phan How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Henri Gilbert, Marine Minier New Results on the Pseudorandomness of Some Blockcipher Constructions. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Cees J. A. Jansen, Dick E. Boekee Modes of Blockcipher Algorithms and their Protection Against Active Eavesdropping. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
41Tetsu Iwata Authenticated Encryption Mode for Beyond the Birthday Bound Security. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF birthday bound, modes of operation, authenticated encryption, security proofs, Blockcipher
41Taizo Shirai, Kyoji Shibutani On Feistel Structures Using a Diffusion Switching Mechanism. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Feistel structure, optimal diffusion mappings, blockcipher
35Jesang Lee, Seokhie Hong, Jaechul Sung, Haeryong Park A New Double-Block-Length Hash Function Using Feistel Structure. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Block Ciphers, Hash Function, Double Block Length Hash Function
35Onur Özen, Martijn Stam Another Glance at Double-Length Hashing. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Ben Morris, Phillip Rogaway, Till Stegers How to Encipher Messages on a Small Domain. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
35Mridul Nandi Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF online cipher, CBC, universal hash function, random permutation
35John P. Steinberger The Collision Intractability of MDC-2 in the Ideal-Cipher Model. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Collision-resistant hashing, MDC-2, cryptographic hash functions, ideal-cipher model
35Jan-Hendrik Evertse Linear Structures in Blockciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
25Munawar Hasan, Donghoon Chang Lynx: Family of Lightweight Authenticated Encryption Schemes Based on Tweakable Blockcipher. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
25Zhongliang Zhang, Zhen Qin, Chun Guo 0002 Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Munawar Hasan, Donghoon Chang Lynx: Family of Lightweight Authenticated Encryption Schemes based on Tweakable Blockcipher. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2023 DBLP  BibTeX  RDF
25Yuqing Zhao, Chun Guo 0002 Towards Minimizing Tweakable Blockcipher-Based Generalized Feistel Networks. Search on Bibsonomy INDOCRYPT (1) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
25Viet Tung Hoang, Cong Wu, Xin Yuan 0001 Faster Yet Safer: Logging System Via Fixed-Key Blockcipher. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
25Viet Tung Hoang, Cong Wu, Xin Yuan 0001 Faster Yet Safer: Logging System Via Fixed-Key Blockcipher. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2022 DBLP  BibTeX  RDF
25Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi Blockcipher-Based Authenticated Encryption: How Small Can We Go? Search on Bibsonomy J. Cryptol. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
25Zhenzhen Bao, Jian Guo 0001, Tetsu Iwata, Kazuhiko Minematsu ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
25Yusuke Naito 0001, Mitsuru Matsui, Takeshi Sugawara 0001, Daisuke Suzuki SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2019 DBLP  BibTeX  RDF
25Zhenzhen Bao, Jian Guo 0001, Tetsu Iwata, Kazuhiko Minematsu ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Hiroki Sato, Mamoru Mimura, Hidema Tanaka Analysis of Division Property using MILP Method for Lightweight Blockcipher Piccolo. Search on Bibsonomy AsiaJCIS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
25Jooyoung Lee 0001, Atul Luykx, Bart Mennink, Kazuhiko Minematsu Connecting tweakable and multi-key blockcipher security. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Yusuke Naito 0001, Mitsuru Matsui, Takeshi Sugawara 0001, Daisuke Suzuki SAEB: A Lightweight Blockcipher-Based AEAD Mode of Operation. Search on Bibsonomy IACR Trans. Cryptogr. Hardw. Embed. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
25Elena Andreeva 0001, Reza Reyhanitabar, Kerem Varici, Damian Vizár Forking a Blockcipher for Authenticated Encryption of Very Short Messages. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
25Jiageng Chen, Rashed Mazumder, Atsuko Miyaji, Chunhua Su Variable message encryption through blockcipher compression function. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Fanbao Liu, Fengmei Liu Universal Forgery with Birthday Paradox: Application to Blockcipher-based Message Authentication Codes and Authenticated Encryptions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
25Yusuke Naito 0001 Blockcipher-based MACs: Beyond the Birthday Bound without Message Length. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
25Bart Mennink, Samuel Neves Optimal PRFs from Blockcipher Designs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
25Bart Mennink Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
25Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi Blockcipher-based Authenticated Encryption: How Small Can We Go? Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
25Bart Mennink, Samuel Neves Optimal PRFs from Blockcipher Designs. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Yusuke Naito 0001 Blockcipher-Based MACs: Beyond the Birthday Bound Without Message Length. Search on Bibsonomy ASIACRYPT (3) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Bart Mennink Insuperability of the Standard Versus Ideal Model Gap for Tweakable Blockcipher Security. Search on Bibsonomy CRYPTO (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi Blockcipher-Based Authenticated Encryption: How Small Can We Go? Search on Bibsonomy CHES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
25Rashed Mazumder, Atsuko Miyaji A New Scheme of Blockcipher Hash. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Thomas Shrimpton, R. Seth Terashima Salvaging Weak Security Bounds for Blockcipher-Based Constructions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
25Rashed Mazumder, Atsuko Miyaji, Chunhua Su A Blockcipher Based Authentication Encryption. Search on Bibsonomy CD-ARES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Thomas Shrimpton, R. Seth Terashima Salvaging Weak Security Bounds for Blockcipher-Based Constructions. Search on Bibsonomy ASIACRYPT (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
25Yiyuan Luo, Xuejia Lai, Tiejun Jia Attacks on a double length blockcipher-based hash proposal. Search on Bibsonomy Cryptogr. Commun. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
25Nilanjan Datta, Mridul Nandi Equivalence between MAC, WCR and PRF for Blockcipher Based Constructions. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Wenyang Liu, Xiaomin Wang, Wenfang Zhang, Xianfeng Guo A lightweight blockcipher based on chaotic maps. Search on Bibsonomy ISBAST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Atsuko Miyaji, Mazumder Rashed, Tsuyoshi Sawada A New (n, n) Blockcipher Hash Function: Apposite for Short Messages. Search on Bibsonomy AsiaJCIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
25Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway Efficient Garbling from a Fixed-Key Blockcipher. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
25Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
25Nilanjan Datta, Mridul Nandi Equivalence between MAC and PRF for Blockcipher based Constructions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2013 DBLP  BibTeX  RDF
25Paul Baecher, Pooya Farshim, Marc Fischlin, Martijn Stam Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions. Search on Bibsonomy EUROCRYPT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Hidenori Kuwakado, Shoichi Hirose Hashing Mode Using a Lightweight Blockcipher. Search on Bibsonomy IMACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Kazuhiko Minematsu A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes. Search on Bibsonomy ProvSec The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Mihir Bellare, Viet Tung Hoang, Sriram Keelveedhi, Phillip Rogaway Efficient Garbling from a Fixed-Key Blockcipher. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
25Ewan Fleischmann Analysis and Design of Blockcipher Based Cryptographic Algorithms. Search on Bibsonomy 2013   RDF
25Masanobu Katagi, Shiho Moriai The 128-Bit Blockcipher CLEFIA. Search on Bibsonomy RFC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Yiyuan Luo, Xuejia Lai Attacks On a Double Length Blockcipher-based Hash Proposal. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
25Yusuke Naito 0001 Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Toru Akishita, Harunaga Hiwatari Very Compact Hardware Implementations of the Blockcipher CLEFIA. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Donghoon Chang, Mridul Nandi, Moti Yung On the Security of Hash Functions Employing Blockcipher Postprocessing. Search on Bibsonomy FSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing. Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25Kyoji Shibutani, Takanori Isobe 0001, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, Taizo Shirai Piccolo: An Ultra-Lightweight Blockcipher. Search on Bibsonomy CHES The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
25John Black, Phillip Rogaway, Thomas Shrimpton, Martijn Stam An Analysis of the Blockcipher-Based Hash Functions from PGV. Search on Bibsonomy J. Cryptol. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Yusuke Naito 0001 Blockcipher-based Double-length Hash Functions for Pseudorandom Oracles. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
25Mridul Nandi A Unified Method for Improving PRF Bounds for a Class of Blockcipher based MACs. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
25Donghoon Chang, Mridul Nandi, Moti Yung On the Security of Hash Functions Employing Blockcipher Postprocessing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
25Yiyuan Luo, Xuejia Lai More Insights on Blockcipher-Based Hash Functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2010 DBLP  BibTeX  RDF
25Mridul Nandi A Unified Method for Improving PRF Bounds for a Class of Blockcipher Based MACs. Search on Bibsonomy FSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
25Martijn Stam Blockcipher Based Hashing Revisited. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2008 DBLP  BibTeX  RDF
25Charlie Obimbo, Behzad Salami 0002 A Parallel Algorithm for determining the inverse of a matrix for use in blockcipher encryption/decryption. Search on Bibsonomy J. Supercomput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Inverse of a matrix, Row-echelon reduction, Parallel Algorithms, Cryptography, Block Ciphers, Modular arithmetic, Systems of linear equations
25John Black, Martin Cochran, Thomas Shrimpton On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2007 DBLP  BibTeX  RDF
25Tetsu Iwata New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
25Martin Stanek Analysis of Fast Blockcipher-Based Hash Functions. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hash functions, provable security, black-box model
25John Black The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2005 DBLP  BibTeX  RDF
25John Black, Martin Cochran, Thomas Shrimpton On the Impossibility of Highly-Efficient Blockcipher-Based Hash Functions. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2004 DBLP  BibTeX  RDF
24Atsushi Mitsuda, Tetsu Iwata Tweakable Pseudorandom Permutation from Generalized Feistel Structure. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Luby-Rackoff theory, generalized Feistel structure, security proofs, tweakable blockcipher
24Phillip Rogaway, John P. Steinberger Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF blockcipher-based hashing, collision-resistant hashing, cryptographic hash functions, compression functions, ideal-cipher model
17Peter Gazi, Ueli M. Maurer Cascade Encryption Revisited. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cascade encryption, random system, indistinguishability, ideal cipher model
17Alexandra Boldyreva, Nathan Chenette, Younho Lee, Adam O'Neill Order-Preserving Symmetric Encryption. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Martijn Stam Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions. Search on Bibsonomy CRYPTO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Thomas Ristenpart, Thomas Shrimpton How to Build a Hash Function from Any Collision-Resistant Function. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu On Tweaking Luby-Rackoff Blockciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Phillip Rogaway, Thomas Shrimpton A Provable-Security Treatment of the Key-Wrap Problem. Search on Bibsonomy EUROCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Henri Gilbert The Security of "One-Block-to-Many" Modes of Operation. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Marine Minier, Henri Gilbert Stochastic Cryptanalysis of Crypton. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Toshinobu Kaneko A Known-Plaintext Attack of FEAL-4 Based on the System of Linear Equations on Difference. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
17Anne Tardy-Corfdir, Henri Gilbert A Known Plaintext Attack of FEAL-4 and FEAL-6. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
17Bert den Boer Cryptanalysis of F.E.A.L. Search on Bibsonomy EUROCRYPT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 101 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license