The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for ciphers with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1964-1981 (17) 1982-1984 (18) 1985-1987 (17) 1988-1989 (18) 1990-1991 (23) 1992-1993 (31) 1994 (18) 1995-1996 (20) 1997 (24) 1998 (45) 1999 (23) 2000 (49) 2001 (61) 2002 (65) 2003 (71) 2004 (100) 2005 (111) 2006 (131) 2007 (141) 2008 (147) 2009 (114) 2010 (57) 2011 (57) 2012 (94) 2013 (83) 2014 (81) 2015 (96) 2016 (94) 2017 (113) 2018 (122) 2019 (112) 2020 (134) 2021 (104) 2022 (120) 2023 (118) 2024 (28)
Publication types (Num. hits)
article(1173) book(6) incollection(41) inproceedings(1370) phdthesis(67)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1525 occurrences of 465 keywords

Results
Found 2657 publication records. Showing 2657 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
118James L. Massey, Ueli M. Maurer, Muzhong Wang Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
117Nicolas T. Courtois The Inverse S-Box, Non-linear Polynomial Relations and Cryptanalysis of Block Ciphers. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF interpolation attack on block ciphers, fractional transformations, homographic functions, generalised linear cryptanalysis, bi-linear cryptanalysis, Block ciphers, AES, Rijndael, Feistel ciphers, multivariate equations
114Adam L. Young, Moti Yung Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. Search on Bibsonomy ACISP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF hidden ciphers, obfuscated ciphers, black-box ciphers, Huffman compression, reverse-engineering, data compression, entropy, subliminal channel, Digital Rights Management (DRM), Symmetric ciphers, kleptography
86Lars R. Knudsen, John Erik Mathiassen On the Role of Key Schedules in Attacks on Iterated Ciphers. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
79Jovan Dj. Golic Modes of Operation of Stream Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2000 DBLP  DOI  BibTeX  RDF keyed hash functions, security, Stream ciphers, block ciphers, hash functions, conversions
78Souradyuti Paul, Bart Preneel On the (In)security of Stream Ciphers Based on Arrays and Modular Addition. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
75Debra L. Cook, John Ioannidis, Angelos D. Keromytis, Jake Luck CryptoGraphics: Secret Key Cryptography Using Graphics Cards. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Graphics Processing Unit, Stream Ciphers, Block Ciphers, AES
74Nicolas T. Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF combiners with memory, LFSR synthesis, Toyocrypt, Cryptrec, LILI-128, E0, Boolean functions, stream ciphers, Bluetooth, nonlinear filters, Algebraic attacks, Berlekamp-Massey algorithm, Nessie, multivariate equations
74Pawel Chodowiec, Po Khuon, Kris Gaj Fast implementations of secret-key block ciphers using mixed inner- and outer-round pipelining. Search on Bibsonomy FPGA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF fast architectures, secret-key ciphers, pipelining, AES
71Moses D. Liskov, Ronald L. Rivest, David A. Wagner 0001 Tweakable Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF tweakable block ciphers, initialization vector, block ciphers, modes of operation
69Gautham Sekar, Souradyuti Paul, Bart Preneel New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
69Nicolas Sklavos 0001, Nick A. Moldovyan, Odysseas G. Koufopavlou High Speed Networking Security: Design and Implementation of Two New DDP-Based Ciphers. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cobra-H64, Cobra-H128, networking security, encryption, data-dependent permutations
69Thomas Johansson 0001 Analysis and Design of Modern Stream Ciphers: (Invited Paper) p. Search on Bibsonomy IMACC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
67Nicolas T. Courtois General Principles of Algebraic Attacks and New Design Criteria for Cipher Components. Search on Bibsonomy AES Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF polynomial relations, design of cryptographic primitives, generalised linear cryptanalysis, multivariate public key encryption and signature schemes, Quartz, combiners with memory, elimination methods, Gröbner bases, Boolean functions, stream ciphers, block ciphers, AES, finite fields, algebraic attacks, Rijndael, Serpent, HFE, Sflash, multivariate equations
66Don Coppersmith, Shai Halevi, Charanjit S. Jutla Cryptanalysis of Stream Ciphers with Linear Masking. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Linear masking, Low-Diffusion attacks, Stream ciphers, Hypothesis testing, Linear cryptanalysis
66Alex Biryukov, Adi Shamir Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF time/memory tradeoff attacks, Cryptanalysis, stream ciphers
66Rüdiger Weis, Stefan Lucks Fast Multimedia Encryption in JAVA: Using Unbalanced Luby/Rackoff Ciphers. Search on Bibsonomy ECMAST The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Luby-Rackoff ciphers, BEAR, LION, BEAST, JAVA, Performance, block cipher
63William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF cascaded ciphers, Shannon model, Double DES, information theory, DES, Ciphers, meet in the middle attacks
61Keke Wu, Huiyun Li, Bo Peng, Fengqi Yu Correlation Power Analysis Attack against Synchronous Stream Ciphers. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
61Mridul Nandi Two New Efficient CCA-Secure Online Ciphers: MHCBC and MCBC. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF online cipher, CBC, universal hash function, random permutation
61James G. Dunham, Ming-Tan Sun, J. C. R. Tseng Classifying file type of stream ciphers in depth using neural networks. Search on Bibsonomy AICCSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
61Thomas Jakobsen, Lars R. Knudsen The Interpolation Attack on Block Ciphers. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
58Shakil Ahmad, Muhammad Arif Wahla, Firdous Kausar Authenticated Encryption in WSN Using eSTREAM Ciphers. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Security, Wireless Sensor Networks, Stream Ciphers, Authenticated Encryption
58Nicolas T. Courtois, Josef Pieprzyk Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MQ problem, overdefined systems of multivariate equations, Gröbner bases, sparse multivariate polynomials, Multivariate Cryptanalysis, Block ciphers, AES, Rijndael, Square, Camellia, Serpent, XL algorithm, multivariate quadratic equations
55Debra L. Cook, Moti Yung, Angelos D. Keromytis Elastic block ciphers: method, security and instantiations. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Elastic block ciphers, Variable-length block ciphers, Reduction proof, Security analysis, Key recovery attacks
54Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee 0002, Dukjae Moon Related-Key Differential Attacks on Cobra-H64 and Cobra-H128. Search on Bibsonomy IMACC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cobra-H64, Cobra-H128, Block Ciphers, Related-Key Attacks, Data-Dependent Permutations
53Lan Luo, Zhiguang Qin, Shijie Zhou A Comment to the Intelligent Functions of Different Weight Ciphers. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
53Christophe De Cannière, Orr Dunkelman, Miroslav Knezevic KATAN and KTANTAN - A Family of Small and Efficient Hardware-Oriented Block Ciphers. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
53Johann Großschädl, Stefan Tillich, Christian Rechberger, Michael Hofmann 0007, Marcel Medwed Energy evaluation of software implementations of block ciphers under memory constraints. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF energy optimization, code size reduction, symmetric cipher, lightweight cryptography, memory footprint
53Gautham Sekar, Souradyuti Paul, Bart Preneel Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
53Wieland Fischer, Berndt M. Gammel, O. Kniffler, Joachim Velten Differential Power Analysis of Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF stream cipher, side-channel attack, DPA, power analysis, Trivium, Grain
53Shoichi Hirose Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
53Xuejia Lai, James L. Massey, Sean Murphy Markov Ciphers and Differential Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
52Debra L. Cook, Angelos D. Keromytis, Moti Yung Elastic block ciphers: the basic design. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF elastic block ciphers, variable-length block ciphers, encryption, block ciphers
51Nicolas T. Courtois Cryptanalysis of Sfinks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF solving systems of multivariate equations, fast algebraic attacks on stream ciphers, Boolean functions, stream ciphers, nonlinear filters, algebraic cryptanalysis
50Nicolas Fournel, Marine Minier, Stéphane Ubéda Survey and Benchmark of Stream Ciphers for Wireless Sensor Networks. Search on Bibsonomy WISTP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF benchmarks, sensors, stream ciphers
50Mohamed Amine Garici, Habiba Drias Cryptanalysis of Substitution Ciphers Using Scatter Search. Search on Bibsonomy IWINAC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF automated cryptanalysis, substitution ciphers, genetic algorithm, heuristic search, optimization problem, scatter search, evolutionary approach
50Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IDEA and MESH ciphers, known-plaintext attack, Cryptanalysis
50Jorge Nakahara Jr. Faster Variants of the MESH Block Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF byte-oriented block ciphers, smart cards, algebraic attacks, IDEA
50Nikhil Joshi, Kaijie Wu 0001, Ramesh Karri Concurrent Error Detection Schemes for Involution Ciphers. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Involutional ciphers, KHAZAD, Fault Tolerance, Concurrent Error Detection (CED)
50Nicolas T. Courtois, Willi Meier Algebraic Attacks on Stream Ciphers with Linear Feedback. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Algebraic attacks on stream ciphers, factoring multivariate polynomials, overdefined problems, ciphertext-only attacks, Toyocrypt, Cryptrec, LILI-128, Boolean functions, nonlinear filtering, pseudo-random generators, Nessie, XL algorithm, multivariate equations
50Palash Sarkar 0001 The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF synchronous stream ciphers, nonlinear filter model, nonlinear combiner model, filter-combiner model, cellular automata, linear feedback shift registers
49Adam J. Elbirt, Christof Paar Instruction-Level Distributed Processing for Symmetric-Key Cryptography. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF algorithm-agility, FPGA, cryptography, VHDL, block cipher
49Elad Barkan, Eli Biham In How Many Ways Can You Write Rijndael? Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
49Eli Biham Cryptanalysis of Ladder-DES. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
45Gregor Leander, Erik Zenner, Philip Hawkes Cache Timing Analysis of LFSR-Based Stream Ciphers. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
45Gordon Meiser, Thomas Eisenbarth 0001, Kerstin Lemke-Rust, Christof Paar Efficient implementation of eSTREAM ciphers on 8-bit AVR microcontrollers. Search on Bibsonomy SIES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
45Gautham Sekar, Souradyuti Paul, Bart Preneel New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Ermaliza Razali, Raphael C.-W. Phan, Marc Joye On the Notions of PRP - RKA , KR and KR - RKA for Block Ciphers. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pseudorandom permutation (PRP), key recovery (KR), related key attacks (RKA), block cipher, Provable security
45Khoongming Khoo, Guang Gong, Hian-Kiat Lee The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Time-memory-data trade-off attack, Rainbow attack, Maiorana-McFarland functions
45Johannes Buchmann 0001, Andrei Pyshkin, Ralf-Philipp Weinmann Block Ciphers Sensitive to Gröbner Basis Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Imran Erguler, Emin Anarim A New Cryptanalytic Time-Memory Trade-Off for Stream Ciphers. Search on Bibsonomy ISCIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45Adi Shamir Stream Ciphers: Dead or Alive? Search on Bibsonomy ASIACRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
45Jonathan J. Hoch, Adi Shamir Fault Analysis of Stream Ciphers. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Lili-128, SOBER-t32, Stream cipher, LFSR, fault attack, RC4
45Alex Biryukov Analysis of Involutional Ciphers: Khazad and Anubis. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
45Jorge Nakahara Jr., Vincent Rijmen, Bart Preneel, Joos Vandewalle The MESH Block Ciphers. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
45Sarvar Patel, Zulfikar Ramzan, Ganapathy S. Sundaram Luby-Rackoff Ciphers: Why XOR Is Not So Exclusive. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
45Ueli M. Maurer New Approaches to the Design of Self-Synchronizing Stream Ciphers. Search on Bibsonomy EUROCRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
45Shimon Even, Oded Goldreich 0001 On the Power of Cascade Ciphers Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
42Shai Halevi, Don Coppersmith, Charanjit S. Jutla Scream: A Software-Efficient Stream Cipher. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Round functions, Stream ciphers, Block ciphers, SEAL
42Jean-Sébastien Coron, Helena Handschuh, Marc Joye, Pascal Paillier, David Pointcheval, Christophe Tymen GEM: A Generic Chosen-Ciphertext Secure Encryption Method. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF generic conversion, stream ciphers, block ciphers, Public-key encryption, random oracle model, chosen-ciphertext security, hybrid encryption
42Hideki Imai, Atsuhiro Yamagishi CRYPTREC Project - Cryptographic Evaluation Project for the Japanese Electronic Government. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF cryptographic technology, asymmmetric ciphers, evaluation, symmetric ciphers
42Joan Daemen, René Govaerts, Joos Vandewalle A Hardware Design Model for Cryptographic Algorithms. Search on Bibsonomy ESORICS The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Hardware Cryptography, Pseudorandom Sequence Generators, Stream Ciphers, Block Ciphers, Cryptographic Hash Functions
42Jorge Nakahara Jr., Gautham Sekar, Daniel Santana de Freitas, Chang Chiann, Ramon Hugo de Souza, Bart Preneel A New Approach to chi2 Cryptanalysis of Block Ciphers. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ? 2, square and linear cryptanalysis, Block ciphers
42David Oranchak Evolutionary algorithm for decryption of monoalphabetic homophonic substitution ciphers encoded as constraint satisfaction problems. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF codebreaking, homophonic substitution, zodiac killer, zodiac murder ciphers, genetic algorithms, cryptography, evolutionary computing, constraint satisfaction
42Shahram Khazaei, Willi Meier New Directions in Cryptanalysis of Self-Synchronizing Stream Ciphers. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Self-synchronizing Stream Ciphers, T-functions, Key Recovery
42Debra L. Cook, Moti Yung, Angelos D. Keromytis The Security of Elastic Block Ciphers Against Key-Recovery Attacks. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Variable-length block ciphers, reduction proof, security analysis, key recovery attacks
42Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF filter function, stream ciphers, initialization, algebraic attacks, clock-control
42Alexander A. Moldovyan, Nick A. Moldovyan, Nicolas Sklavos 0001 Controlled elements for designing ciphers suitable to efficient VLSI implementation. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Security, Block ciphers, Hardware implementation, Data-dependent operations
42Pascal Junod, Serge Vaudenay FOX : A New Family of Block Ciphers. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Lai-Massey scheme, Block ciphers
42Howard M. Heys Analysis of the Statistical Cipher Feedback Mode of Block Ciphers. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF block cipher modes, Cryptography, synchronization, stream ciphers, error propagation
42Alex Biryukov, Christophe De Cannière Block Ciphers and Systems of Quadratic Equations. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Khazad, Misty, Block ciphers, linearization, Rijndael, Camellia, Serpent, multivariate quadratic equations
42John Black, Phillip Rogaway Ciphers with Arbitrary Finite Domains. Search on Bibsonomy CT-RSA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Provable security, Modes of Operation, Symmetric Encryption, Ciphers
42Philip Hawkes, Gregory G. Rose Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF SOBER, t-class, SSC-II, cryptanalysis, stream ciphers
42Vladimir V. Chepyzhov, Thomas Johansson 0001, Ben J. M. Smeets A Simple Algorithm for Fast Correlation Attacks on Stream Ciphers. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF cryptanalysis, Stream ciphers, correlation attacks
41Dirk Stegemann Extended BDD-Based Cryptanalysis of Keystream Generators. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF F-FCSR, cryptanalysis, Stream cipher, BDD, Trivium, Grain
41Adam J. Elbirt, Christof Paar An Instruction-Level Distributed Processor for Symmetric-Key Cryptography. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF algorithm-agility, FPGA, Cryptography, VHDL, block cipher
41Nicolas T. Courtois Algebraic Attacks on Combiners with Memory and Several Outputs. Search on Bibsonomy ICISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Firdous Kausar, Ayesha Naureen A Comparative Analysis of HC-128 and Rabbit Encryption Schemes for Pervasive Computing in WSN Environment. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF H-128, Wireless Sensor Network (WSN), Pervasive Computing, Stream Ciphers, Rabbit
38Deike Priemuth-Schmid, Alex Biryukov Slid Pairs in Salsa20 and Trivium. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Salsa20, cryptanalysis, stream ciphers, eSTREAM, Trivium
38Sondre Rønjom, Tor Helleseth The Linear Vector Space Spanned by the Nonlinear Filter Generator. Search on Bibsonomy SSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cyclic vector spaces, stream ciphers, m-sequences
38Raphael C.-W. Phan, Mohammad Umar Siddiqi A Framework for Describing Block Cipher Cryptanalysis. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF framework, cryptanalysis, generalization, Encryption, block ciphers, distinguishers
38Frédéric Didier, Jean-Pierre Tillich Computing the Algebraic Immunity Efficiently. Search on Bibsonomy FSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Low degree multiple, Boolean functions, Stream ciphers, Algebraic attacks, Algebraic immunity, Annihilator
38Jovan Dj. Golic DeKaRT: A New Paradigm for Key-Dependent Reversible Circuits. Search on Bibsonomy CHES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Keyed reversible circuits, data scrambling, probing attacks, block ciphers, power analysis, countermeasures
38Nick A. Moldovyan On Cipher Design Based on Switchable Controlled Operations. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Fast Encryption, Hardware-Oriented Ciphers, Switchable Operations, Controlled Operations, Data-Dependent Operations
38Lars R. Knudsen, David A. Wagner 0001 Integral Cryptanalysis. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF MISTY, integrals, Cryptanalysis, block ciphers
38Anne Canteaut, Marion Videau Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF higher order differential cryptanalysis, Boolean functions, Block ciphers, nonlinearity
38Nicolas T. Courtois Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF overdefined systems of multivariate equations, MQ problem, Gröbner bases, ciphertext-only attacks, Toyocrypt-HR1, Toyocrypt-HS1, Cryptrec, stream ciphers, nonlinear filtering, pseudo-random generators, Multivariate cryptography, XL algorithm
38Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Fast Correlation Attack Algorithm with List Decoding and an Application. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF nonlinear combiner, cryptanalysis, Stream ciphers, linear feedback shift registers, nonlinear filter, keystream generators
38Helger Lipmaa IDEA: A Cipher For Multimedia Architectures? Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF multimedia architectures, Pentium MMX, block ciphers, IDEA, fast implementations
37Zhiyuan Wang, Jianhua Huang, Ziming Guan The SOBER Family Ciphers Reconfigurable Processing Architecture Design. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Demijan Klinc, Carmit Hazay, Ashish Jagmohan, Hugo Krawczyk, Tal Rabin On Compression of Data Encrypted with Block Ciphers. Search on Bibsonomy DCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Dimitris Theodoropoulos, Alexandros Siskos, Dionisios N. Pnevmatikatos CCproc: A Custom VLIW Cryptography Co-processor for Symmetric-Key Ciphers. Search on Bibsonomy ARC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cryptography, VLIW, reconfigurable processors
37Onur Özen, Kerem Varici, Cihangir Tezcan, Çelebi Kocair Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hight, Impossible Differential Attack, Present, Related-Key Attack, Rectangle Attack
37Daniel J. Bernstein The Salsa20 Family of Stream Ciphers. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Debra L. Cook, Moti Yung, Angelos D. Keromytis Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers. Search on Bibsonomy ACISP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security analysis, differential cryptanalysis, linear cryptanalysis
37Yassin M. Hasan, Hesham A. Abulenein Key-linked block ciphers with input-output shuffling applied to remotely keyed encryption. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum An Analysis of the Hermes8 Stream Ciphers. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hermes8, Cryptanalysis, Stream Cipher
37N. Nalini, G. Raghavendra Rao Cryptanalysis of Block Ciphers via Improved Simulated Annealing Technique. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
37Sandeep S. Kumar, Christof Paar, Jan Pelzl, Gerd Pfeiffer, Manfred Schimmler Breaking Ciphers with COPACOBANA - A Cost-Optimized Parallel Code Breaker. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 2657 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license