×

Found 31 Documents (Results 1–31)

Information security and privacy. 28th Australasian conference, ACISP 2023, Brisbane, QLD, Australia, July 5–7, 2023. Proceedings. (English) Zbl 1528.68035

Lecture Notes in Computer Science 13915. Cham: Springer (ISBN 978-3-031-35485-4/pbk; 978-3-031-35486-1/ebook). xiii, 652 p. (2023).
PDFBibTeX XMLCite
Full Text: DOI

Algebraic attacks on grain-like keystream generators. (English) Zbl 07628052

Park, Jong Hwan (ed.) et al., Information security and cryptology – ICISC 2021. 24th international conference, Seoul, South Korea, December 1–3, 2021. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 13218, 241-270 (2022).
MSC:  68M25 68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential random fault attacks on certain CAESAR stream ciphers. (English) Zbl 1457.94194

Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 297-315 (2020).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Fault attacks on XEX mode with application to certain authenticated encryption modes. (English) Zbl 1386.94083

Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 285-305 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Flaws in the initialisation process of stream ciphers. (English) Zbl 1382.94043

Daras, Nicholas J. (ed.) et al., Computation, cryptography, and network security. Cham: Springer (ISBN 978-3-319-18274-2/hbk; 978-3-319-18275-9/ebook). 19-49 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Weaknesses in the initialisation process of the common scrambling algorithm stream cipher. (English) Zbl 1355.94031

Schmidt, Kai-Uwe (ed.) et al., Sequences and their applications – SETA 2014. 8th international conference, Melbourne, VIC, Australia, November 24–28, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-12324-0/pbk; 978-3-319-12325-7/ebook). Lecture Notes in Computer Science 8865, 220-233 (2014).
MSC:  94A55 94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security and privacy. 18th Australasian conference, ACISP 2013, Brisbane, Australia, July 1–3, 2013. Proceedings. (English) Zbl 1264.94003

Lecture Notes in Computer Science 7959. Berlin: Springer (ISBN 978-3-642-39058-6/pbk). xi, 437 p. (2013).
PDFBibTeX XMLCite
Full Text: DOI

A general model for MAC generation using direct injection. (English) Zbl 1311.94069

Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 198-215 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Analysis of indirect message injection for MAC generation using stream ciphers. (English) Zbl 1305.94031

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 138-151 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

A framework for security analysis of key derivation functions. (English) Zbl 1291.94166

Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 199-216 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

State convergence in the initialisation of stream ciphers. (English) Zbl 1279.94118

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 75-88 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Linearity within the SMS4 block cipher. (English) Zbl 1281.94064

Bao, Feng (ed.) et al., Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). Lecture Notes in Computer Science 6151, 248-265 (2010).
MSC:  94A60 94B25
PDFBibTeX XMLCite
Full Text: DOI Link

Improved cryptanalysis of the common scrambling algorithm stream cipher. (English) Zbl 1307.94098

Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 108-121 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

A discussion of constrained binary embeddings with applications to cryptanalysis of irregularly clocked stream ciphers. (English) Zbl 1158.94382

Balakrishnan, R. (ed.) et al., Proceedings of the international conference on discrete mathematics (ICDM 2006), Bangalore, India, December 15–18, 2006. Mysore: Ramanujan Mathematical Society (ISBN 978-81-902545-7-1/hbk). Ramanujan Mathematical Society Lecture Notes Series 7, 73-85 (2008).
MSC:  94A60
PDFBibTeX XMLCite

On the security of the LILI family of stream ciphers against algebraic attacks. (English) Zbl 1213.94076

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 11-28 (2007).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Improved cryptanalysis of mag. (English) Zbl 1176.94060

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 64-75 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Dragon: A fast word based stream cipher. (English) Zbl 1133.68336

Park, Choonsik (ed.) et al., Information security and cryptology – ICISC 2004. 7th international conference, Seoul, Korea, December 2–3, 2004. Revised Selected Papers. Berlin: Springer (ISBN 978-3-540-26226-8/pbk). Lecture Notes in Computer Science 3506, 33-50 (2005).
MSC:  68P25 94A60 94A55
PDFBibTeX XMLCite
Full Text: DOI

A complete divide and conquer attack on the Alpha1 stream cipher. (English) Zbl 1092.94502

Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 418-431 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The LILI-II keystream generator. (English) Zbl 1020.94514

Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 25-39 (2002).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

A survey of divide and conquer attacks on certain irregularly clocked stream ciphers. (English) Zbl 1003.94520

Lam, Kwok-Yan (ed.) et al., Cryptography and computational number theory. Proceedings of the workshop, CCNT’99, Singapore, November 22-26, 1999. Basel: Birkhäuser. Prog. Comput. Sci. Appl. Log. 20, 165-185 (2001).
MSC:  94A55 94A60
PDFBibTeX XMLCite

Designing Boolean functions for cryptographic applications. (English) Zbl 0987.94034

Dorninger, D. (ed.) et al., Contributions to general algebra 12. Proceedings of the 58th workshop on general algebra “58. Arbeitstagung Allgemeine Algebra”, Vienna, Austria, June 3-6, 1999. Klagenfurt: Verlag Johannes Heyn. 1-21 (2000).
MSC:  94A60 06E30 94C10
PDFBibTeX XMLCite

Fast correlation attacks and multiple linear approximations. (English) Zbl 0990.94513

Varadharajan, Vijay (ed.) et al., Information security and privacy. 2nd Australasian conference, ACISP ’97. Sidney, NSW, Australia. July 7-9, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1270, 228-239 (1997).
MSC:  94A60 62H20
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software