×

Found 28 Documents (Results 1–28)

Polye+CTR: a swiss-army-knife mode for block ciphers. (English) Zbl 1298.94116

Boyen, Xavier (ed.) et al., Provable security. 5th international conference, ProvSec 2011, Xi’an, China, October 16–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24315-8/pbk). Lecture Notes in Computer Science 6980, 266-280 (2011).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Zero-sum distinguishers for iterated permutations and application to Keccak-\(f\) and Hamsi-256. (English) Zbl 1290.94048

Biryukov, Alex (ed.) et al., Selected areas in cryptography. 17th international workshop, SAC 2010, Waterloo, Ontario, Canada, August 12–13, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-19573-0/pbk). Lecture Notes in Computer Science 6544, 1-17 (2011).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Distinguishers for ciphers and known key attack against Rijndael with large blocks. (English) Zbl 1246.94035

Preneel, Bart (ed.), Progress in cryptology – AFRICACRYPT 2009. Second international conference on cryptology in Africa, Gammarth, Tunisia, June 21–25, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02383-5/pbk). Lecture Notes in Computer Science 5580, 60-76 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptographic properties and application of a generalized unbalanced Feistel network structure. (English) Zbl 1307.94048

Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 73-89 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cube attacks on tweakable black box polynomials. (English) Zbl 1239.94045

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 278-299 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A statistical saturation attack against the block cipher PRESENT. (English) Zbl 1237.94056

Fischlin, Marc (ed.), Topics in cryptology – CT-RSA 2009. The cryptographers’ track at the RSA conference 2009, San Francisco, CA, USA, April 20–24, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00861-0/pbk). Lecture Notes in Computer Science 5473, 195-210 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

New directions in cryptanalysis of self-synchronizing stream ciphers. (English) Zbl 1203.94107

Roy Chowdhury, Dipanwita (ed.) et al., Progress in cryptology – INDOCRYPT 2008. 9th international conference on cryptology in India, Kharagpur, India, December 14–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89753-8/pbk). Lecture Notes in Computer Science 5365, 15-26 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

SEA: a scalable encryption algorithm for small embedded applications. (English) Zbl 1333.94048

Domingo-Ferrer, Josep (ed.) et al., Smart card research and advanced applications. 7th IFIP WG 8.8/11.2 international conference, CARDIS 2006, Tarragona, Spain, April 19–21, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-33311-1/pbk; 978-3-540-33312-8/ebook). Lecture Notes in Computer Science 3928, 222-236 (2006).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software