Zhang, Jiang; Chen, Yu; Zhang, Zhenfeng Lattice-based programmable hash functions and applications. (English) Zbl 07793132 J. Cryptology 37, No. 1, Paper No. 4, 57 p. (2024). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{J. Zhang} et al., J. Cryptology 37, No. 1, Paper No. 4, 57 p. (2024; Zbl 07793132) Full Text: DOI
Chairattana-Apirom, Rutchathon; Hanzlik, Lucjan; Loss, Julian; Lysyanskaya, Anna; Wagner, Benedikt PI-Cut-Choo and friends: compact blind signatures via parallel instance cut-and-choose and more. (English) Zbl 1517.94185 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13509, 3-31 (2022). MSC: 94A62 94A60 68P25 PDFBibTeX XMLCite \textit{R. Chairattana-Apirom} et al., Lect. Notes Comput. Sci. 13509, 3--31 (2022; Zbl 1517.94185) Full Text: DOI
Libert, Benoît; Khoa Nguyen; Peters, Thomas; Yung, Moti One-shot Fiat-Shamir-based NIZK arguments of composite residuosity and logarithmic-size ring signatures in the standard model. (English) Zbl 1496.94057 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13276, 488-519 (2022). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{B. Libert} et al., Lect. Notes Comput. Sci. 13276, 488--519 (2022; Zbl 1496.94057) Full Text: DOI
Chevallier-Mames, Benoît A pairing-free signature scheme from correlation intractable hash function and strong Diffie-Hellman assumption. (English) Zbl 1492.94185 Galbraith, Steven D. (ed.), Topics in cryptology – CT-RSA 2022. Cryptographers’ track at the RSA conference 2022, virtual event, March 1–2, 2022. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13161, 26-48 (2022). MSC: 94A62 94A60 68P25 PDFBibTeX XMLCite \textit{B. Chevallier-Mames}, Lect. Notes Comput. Sci. 13161, 26--48 (2022; Zbl 1492.94185) Full Text: DOI
Chen, Liqing; Li, Jiguo; Lu, Yang; Zhang, Yichen Adaptively secure certificate-based broadcast encryption and its application to cloud storage service. (English) Zbl 1474.68136 Inf. Sci. 538, 273-289 (2020). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{L. Chen} et al., Inf. Sci. 538, 273--289 (2020; Zbl 1474.68136) Full Text: DOI
Zhang, Qihui; Hu, Xuexian; Liu, Wenfen; Wei, Jianghong Improved verifier-based three-party password-authenticated key exchange protocol. (Chinese. English summary) Zbl 1474.68020 J. Softw. 31, No. 10, 3238-3250 (2020). MSC: 68M12 68P25 94A62 PDFBibTeX XMLCite \textit{Q. Zhang} et al., J. Softw. 31, No. 10, 3238--3250 (2020; Zbl 1474.68020) Full Text: DOI
Daemen, Joan; Rijmen, Vincent The design of Rijndael. The Advanced Encryption Standard (AES). 2nd revised and updated edition. (English) Zbl 1437.94001 Information Security and Cryptography. Berlin: Springer (ISBN 978-3-662-60768-8/hbk; 978-3-662-60769-5/ebook). xviii, 282 p. (2020). MSC: 94-01 68-01 68P25 94A60 PDFBibTeX XMLCite \textit{J. Daemen} and \textit{V. Rijmen}, The design of Rijndael. The Advanced Encryption Standard (AES). 2nd revised and updated edition. Berlin: Springer (2020; Zbl 1437.94001) Full Text: DOI
Krishnaa, Auparajita Inner magic and inner antimagic graphs in cryptography. (English) Zbl 1495.05295 J. Discrete Math. Sci. Cryptography 22, No. 6, 1057-1066 (2019). MSC: 05C78 94A60 PDFBibTeX XMLCite \textit{A. Krishnaa}, J. Discrete Math. Sci. Cryptography 22, No. 6, 1057--1066 (2019; Zbl 1495.05295) Full Text: DOI
Zeng, Ming; Chen, Jie; Zhang, Kai; Qian, Haifeng Public key encryption with equality test via hash proof system. (English) Zbl 1431.68024 Theor. Comput. Sci. 795, 20-35 (2019). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{M. Zeng} et al., Theor. Comput. Sci. 795, 20--35 (2019; Zbl 1431.68024) Full Text: DOI
Klima, Richard; Sigmon, Neil Cryptology. Classical and modern. 2nd edition. (English) Zbl 1480.94002 Chapman & Hall/CRC Cryptography and Network Security. Boca Raton, FL: CRC Press (ISBN 978-1-138-04762-4/hbk; 978-1-032-47592-9/pbk; 978-1-351-69254-0/ebook). xiii, 482 p. (2019). MSC: 94-01 94A60 11T71 68P25 81P94 PDFBibTeX XMLCite \textit{R. Klima} and \textit{N. Sigmon}, Cryptology. Classical and modern. 2nd edition. Boca Raton, FL: CRC Press (2019; Zbl 1480.94002) Full Text: DOI
Saraswat, Vishal; Sahu, Rajeev Anand Short integrated PKE+PEKS in standard model. (English) Zbl 1505.94079 Ali, Sk Subidh (ed.) et al., Security, privacy, and applied cryptography engineering. 7th international conference, SPACE 2017, Goa, India, December 13–17, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10662, 226-246 (2017). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{V. Saraswat} and \textit{R. A. Sahu}, Lect. Notes Comput. Sci. 10662, 226--246 (2017; Zbl 1505.94079) Full Text: DOI
Hu, Xiaoming; Zhang, Xiaojun; Wang, Jian; Xu, Huajie; Tan, Wenan; Yang, Yinchun Secure and efficient identity-based proxy signature scheme in the standard model based on computational Diffie-Hellman problem. (English) Zbl 1391.94761 Arab. J. Sci. Eng. 42, No. 2, 639-649 (2017). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{X. Hu} et al., Arab. J. Sci. Eng. 42, No. 2, 639--649 (2017; Zbl 1391.94761) Full Text: DOI
Gong, Linming; Li, Shundong; Wang, Daoshun; Dou, Jiawei Randomized coding of plaintext encryption scheme. (Chinese. English summary) Zbl 1389.68020 J. Softw. 28, No. 2, 372-383 (2017). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{L. Gong} et al., J. Softw. 28, No. 2, 372--383 (2017; Zbl 1389.68020) Full Text: DOI
Huang, Kaibin; Tso, Raylin; Chen, Yu-Chi Somewhat semantic secure public key encryption with filtered-equality-test in the standard model and its extension to searchable encryption. (English) Zbl 1372.68087 J. Comput. Syst. Sci. 89, 400-409 (2017). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{K. Huang} et al., J. Comput. Syst. Sci. 89, 400--409 (2017; Zbl 1372.68087) Full Text: DOI
Hu, Xiaoming; Wang, Jian; Xu, Huajie; Yang, Yinchun; Xu, Xiaolin An improved efficient identity-based proxy signature in the standard model. (English) Zbl 1386.94075 Int. J. Comput. Math. 94, No. 1, 22-38 (2017). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{X. Hu} et al., Int. J. Comput. Math. 94, No. 1, 22--38 (2017; Zbl 1386.94075) Full Text: DOI
Yu, Jia; Hao, Rong; Zhao, Huawei; Shu, Minglei; Fan, Jianxi IRIBE: intrusion-resilient identity-based encryption. (English) Zbl 1390.68284 Inf. Sci. 329, 90-104 (2016). MSC: 68P25 PDFBibTeX XMLCite \textit{J. Yu} et al., Inf. Sci. 329, 90--104 (2016; Zbl 1390.68284) Full Text: DOI
Sato, Tetsuya Approximate relational Hoare logic for continuous random samplings. (English) Zbl 1401.68206 Birkedal, Lars (ed.), Proceedings of the 32nd conference on the mathematical foundations of programming semantics (MFPS XXXII), Carnegie Mellon University, Pittsburgh, PA, USA, May 23–26, 2016. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 325, 277-298 (2016). MSC: 68Q60 03B70 18C15 68P15 68P25 68Q55 68Q87 PDFBibTeX XMLCite \textit{T. Sato}, Electron. Notes Theor. Comput. Sci. 325, 277--298 (2016; Zbl 1401.68206) Full Text: DOI arXiv
Zhou, Caixue Cryptanalysis of some signcryption schemes in the standard model. (Chinese. English summary) Zbl 1374.68198 Math. Pract. Theory 46, No. 21, 134-140 (2016). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{C. Zhou}, Math. Pract. Theory 46, No. 21, 134--140 (2016; Zbl 1374.68198)
Lu, Lingyun; Huo, Lili; Du, Haifeng Multi-dimension cooperative security design for multi-user MIMO-OFDM. (Chinese. English summary) Zbl 1374.94795 Syst. Eng. Electron. 38, No. 10, 2413-2419 (2016). MSC: 94A60 68P25 94B60 PDFBibTeX XMLCite \textit{L. Lu} et al., Syst. Eng. Electron. 38, No. 10, 2413--2419 (2016; Zbl 1374.94795)
Wei, Fushan; Ma, Jianfeng; Li, Guangsong; Ma, Chuangui Efficient three-party password-based authenticated key exchange protocol in the standard model. (Chinese. English summary) Zbl 1374.68057 J. Softw. 27, No. 9, 2389-2399 (2016). MSC: 68M12 68P25 94A60 PDFBibTeX XMLCite \textit{F. Wei} et al., J. Softw. 27, No. 9, 2389--2399 (2016; Zbl 1374.68057) Full Text: DOI
Wei, Fushan; Zhang, Gang; Ma, Jianfeng; Ma, Chuangui Privacy-preserving multi-factor key exchange protocol in the standard model. (Chinese. English summary) Zbl 1363.68020 J. Softw. 27, No. 6, 1511-1522 (2016). MSC: 68M12 68P25 94A62 PDFBibTeX XMLCite \textit{F. Wei} et al., J. Softw. 27, No. 6, 1511--1522 (2016; Zbl 1363.68020) Full Text: DOI
Hu, Zhihua; Xiong, Kuanjiang A novel key scheduling scheme for AES algorithm. (English) Zbl 1363.68074 Wuhan Univ. J. Nat. Sci. 21, No. 2, 110-114 (2016). MSC: 68P25 68M20 PDFBibTeX XMLCite \textit{Z. Hu} and \textit{K. Xiong}, Wuhan Univ. J. Nat. Sci. 21, No. 2, 110--114 (2016; Zbl 1363.68074) Full Text: DOI
Wang, Fenghe; Liu, Zhenhua; Wang, Chunxiao Full secure identity-based encryption scheme with short public key size over lattices in the standard model. (English) Zbl 1362.68067 Int. J. Comput. Math. 93, No. 6, 854-863 (2016). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{F. Wang} et al., Int. J. Comput. Math. 93, No. 6, 854--863 (2016; Zbl 1362.68067) Full Text: DOI
Miles, Eric; Viola, Emanuele Substitution-permutation networks, pseudorandom functions, and natural proofs. (English) Zbl 1426.68084 J. ACM 62, No. 6, Article No. 46, 29 p. (2015). MSC: 68P25 68Q04 68Q06 94A60 PDFBibTeX XMLCite \textit{E. Miles} and \textit{E. Viola}, J. ACM 62, No. 6, Article No. 46, 29 p. (2015; Zbl 1426.68084) Full Text: DOI
Wang, Shengbao; Zeng, Peng; Choo, Kim-Kwang Raymond; Wang, Hongbing A CCA2-secure multi-decrypter encryption scheme without random oracles. (English) Zbl 1387.68108 Informatica, Vilnius 26, No. 3, 543-556 (2015). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{S. Wang} et al., Informatica, Vilnius 26, No. 3, 543--556 (2015; Zbl 1387.68108) Full Text: Link
Galindo, David Compact hierarchical identity-based encryption based on a Harder decisional problem. (English) Zbl 1375.94126 Int. J. Comput. Math. 92, No. 3, 463-472 (2015). MSC: 94A60 68P25 68Q17 PDFBibTeX XMLCite \textit{D. Galindo}, Int. J. Comput. Math. 92, No. 3, 463--472 (2015; Zbl 1375.94126) Full Text: DOI
Preetha Mathew, K.; Vasant, Sachin; Pandu Rangan, C. Efficient code based hybrid and deterministic encryptions in the standard model. (English) Zbl 1445.94027 Lee, Hyang-Sook (ed.) et al., Information security and cryptology – ICISC 2013. 16th international conference, Seoul, South Korea, November 27–29, 2013. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 8565, 517-535 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Preetha Mathew} et al., Lect. Notes Comput. Sci. 8565, 517--535 (2014; Zbl 1445.94027) Full Text: DOI
Lu, Xiuhua; Wen, Qiaoyan; Jin, Zhengping; Wang, Licheng; Yang, Chunli A lattice-based signcryption scheme without random oracles. (English) Zbl 1360.94322 Front. Comput. Sci. 8, No. 4, 667-675 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{X. Lu} et al., Front. Comput. Sci. 8, No. 4, 667--675 (2014; Zbl 1360.94322) Full Text: DOI
Zhang, Minqing; Zhang, Tengfei; Wang, Xu’an A publicly verifiable encryption in multilinear maps. (Chinese. English summary) Zbl 1324.68045 J. Wuhan Univ., Nat. Sci. Ed. 60, No. 6, 507-512 (2014). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{M. Zhang} et al., J. Wuhan Univ., Nat. Sci. Ed. 60, No. 6, 507--512 (2014; Zbl 1324.68045)
Han, Yiliang; Yue, Zelun; Yang, Xiaoyuan; Wei, Yuechuan A provable secure multivariate encryption scheme in standard model. (Chinese. English summary) Zbl 1324.94031 J. Huazhong Univ. Sci. Technol. 42, No. 11, 47-51 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Han} et al., J. Huazhong Univ. Sci. Technol. 42, No. 11, 47--51 (2014; Zbl 1324.94031) Full Text: DOI
Yuan, Yumin; Wang, Chenhui Certificateless signature scheme with security enhanced in the standard model. (English) Zbl 1296.94146 Inf. Process. Lett. 114, No. 9, 492-499 (2014). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Yuan} and \textit{C. Wang}, Inf. Process. Lett. 114, No. 9, 492--499 (2014; Zbl 1296.94146) Full Text: DOI
Wang, Yang; Au, Man Ho; Susilo, Willy Attribute-based optimistic fair exchange: how to restrict brokers with policies. (English) Zbl 1282.68099 Theor. Comput. Sci. 527, 83-96 (2014). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{Y. Wang} et al., Theor. Comput. Sci. 527, 83--96 (2014; Zbl 1282.68099) Full Text: DOI
Arai, Kenichi; Okazaki, Hiroyuki Formalization of the Advanced Encryption Standard. I. (English) Zbl 1298.94077 Formaliz. Math. 21, No. 3, 171-184 (2013). MSC: 94A60 68P25 03B35 PDFBibTeX XMLCite \textit{K. Arai} and \textit{H. Okazaki}, Formaliz. Math. 21, No. 3, 171--184 (2013; Zbl 1298.94077) Full Text: DOI
Li, Fagen; Zhang, Mingwu; Takagi, Tsuyoshi Identity-based partially blind signature in the standard model for electronic cash. (English) Zbl 1297.94119 Math. Comput. Modelling 58, No. 1-2, 196-203 (2013). MSC: 94A62 68P25 94A60 PDFBibTeX XMLCite \textit{F. Li} et al., Math. Comput. Modelling 58, No. 1--2, 196--203 (2013; Zbl 1297.94119) Full Text: DOI
You, Lin; Yang, Yilin; Wen, Wanli Formulations of some bit switching functions in DES. (English) Zbl 1299.94097 Wuhan Univ. J. Nat. Sci. 18, No. 5, 402-406 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{L. You} et al., Wuhan Univ. J. Nat. Sci. 18, No. 5, 402--406 (2013; Zbl 1299.94097) Full Text: DOI
Shi, Xianzhi; Lin, Changlu; Zhang, Shengyuan; Tang, Fei An identity-based threshold signature scheme with non-trusted dealer. (Chinese. English summary) Zbl 1299.68030 J. Wuhan Univ., Nat. Sci. Ed. 59, No. 2, 137-142 (2013). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{X. Shi} et al., J. Wuhan Univ., Nat. Sci. Ed. 59, No. 2, 137--142 (2013; Zbl 1299.68030)
Liu, Zhenhua; Hu, Yupu; Zhang, Xiangsong An efficient and strongly unforgeable short signature scheme in standard model. (Chinese. English summary) Zbl 1299.94089 J. Jiangsu Univ., Nat. Sci. 34, No. 3, 309-313 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Z. Liu} et al., J. Jiangsu Univ., Nat. Sci. 34, No. 3, 309--313 (2013; Zbl 1299.94089) Full Text: DOI
Huang, Yueying; Zhang, Jingang Cryptanalysis of an identity-based proxy signature scheme in standard model. (Chinese. English summary) Zbl 1289.94051 J. Huazhong Norm. Univ., Nat. Sci. 47, No. 2, 158-161 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Huang} and \textit{J. Zhang}, J. Huazhong Norm. Univ., Nat. Sci. 47, No. 2, 158--161 (2013; Zbl 1289.94051)
Lu, Yang; Li, Jiguo New forward-secure public-key encryption without random oracles. (English) Zbl 1291.94122 Int. J. Comput. Math. 90, No. 12, 2603-2613 (2013). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{Y. Lu} and \textit{J. Li}, Int. J. Comput. Math. 90, No. 12, 2603--2613 (2013; Zbl 1291.94122) Full Text: DOI
Liang, Kaitai; Liu, Zhen; Tan, Xiao; Wong, Duncan S.; Tang, Chunming A CCA-secure identity-based conditional proxy re-encryption without random oracles. (English) Zbl 1342.68124 Kwon, Taekyoung (ed.) et al., Information security and cryptology – ICISC 2012. 15th international conference, Seoul, Korea, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37681-8/pbk). Lecture Notes in Computer Science 7839, 231-246 (2013). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{K. Liang} et al., Lect. Notes Comput. Sci. 7839, 231--246 (2013; Zbl 1342.68124) Full Text: DOI
Huang, Qiong; Wong, Duncan S. Short and efficient convertible undeniable signature schemes without random oracles. (English) Zbl 1260.94066 Theor. Comput. Sci. 476, 67-83 (2013). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{Q. Huang} and \textit{D. S. Wong}, Theor. Comput. Sci. 476, 67--83 (2013; Zbl 1260.94066) Full Text: DOI
Selvakumar, R.; Gupta, Nishant Fundamental circuits and cut-sets used in cryptography. (English) Zbl 1349.94131 J. Discrete Math. Sci. Cryptography 15, No. 4-5, 287-301 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{R. Selvakumar} and \textit{N. Gupta}, J. Discrete Math. Sci. Cryptography 15, No. 4--5, 287--301 (2012; Zbl 1349.94131) Full Text: DOI
Tsai, Tung-Tso; Tseng, Yuh-Min; Wu, Tsu-Yang A fully secure revocable ID-based encryption in the standard model. (English) Zbl 1268.68079 Informatica, Vilnius 23, No. 3, 487-505 (2012). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{T.-T. Tsai} et al., Informatica, Vilnius 23, No. 3, 487--505 (2012; Zbl 1268.68079)
Tousi, M. M.; Khorasani, K. Optimal hybrid fault recovery in a team of unmanned aerial vehicles. (English) Zbl 1260.93113 Automatica 48, No. 2, 410-418 (2012). MSC: 93C65 49N90 93C85 93A13 PDFBibTeX XMLCite \textit{M. M. Tousi} and \textit{K. Khorasani}, Automatica 48, No. 2, 410--418 (2012; Zbl 1260.93113) Full Text: DOI Link
Wang, Yongtao; Chen, Kefei; Long, Yu; Liu, Zhaohui Accountable authority key policy attribute-based encryption. (English) Zbl 1245.68081 Sci. China, Inf. Sci. 55, No. 7, 1631-1638 (2012). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{Y. Wang} et al., Sci. China, Inf. Sci. 55, No. 7, 1631--1638 (2012; Zbl 1245.68081) Full Text: DOI Link
Mjølsnes, Stig F. A multidisciplinary introduction to information security. (English) Zbl 1236.94006 Discrete Mathematics and its Applications. Boca Raton, FL: CRC Press (ISBN 978-1-4200-8590-7/hbk). xxv, 322 p. (2012). MSC: 94-01 68M10 68M12 68P25 81P94 94A05 94A60 94A62 PDFBibTeX XMLCite \textit{S. F. Mjølsnes}, A multidisciplinary introduction to information security. Boca Raton, FL: CRC Press (2012; Zbl 1236.94006)
Sun, Jin; Hu, Yu-pu; Zhang, Le-you Chosen ciphertext secure identity-based broadcast encryption in the standard model. (English) Zbl 1283.94083 J. Shanghai Jiaotong Univ., Sci. 16, No. 6, 672-676 (2011). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Sun} et al., J. Shanghai Jiaotong Univ., Sci. 16, No. 6, 672--676 (2011; Zbl 1283.94083) Full Text: DOI
Yang, Yong; Xu, Qiuliang Certified public key encryption without pairing calculation using standard model. (Chinese. English summary) Zbl 1249.94043 Trans. Beijing Inst. Technol. 31, No. 5, 541-546 (2011). MSC: 94A60 68P25 11T71 PDFBibTeX XMLCite \textit{Y. Yang} and \textit{Q. Xu}, Trans. Beijing Inst. Technol. 31, No. 5, 541--546 (2011; Zbl 1249.94043)
Souissi, Youssef; Nassar, Maxime; Guilley, Sylvain; Danger, Jean-Luc; Flament, Florent First principal components analysis: a new side channel distinguisher. (English) Zbl 1341.68045 Rhee, Kyung-Hyune (ed.) et al., Information security and cryptology – ICISC 2010. 13th international conference, Seoul, Korea, December 1–3, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24208-3/pbk). Lecture Notes in Computer Science 6829, 407-419 (2011). MSC: 68P25 62H25 94A60 PDFBibTeX XMLCite \textit{Y. Souissi} et al., Lect. Notes Comput. Sci. 6829, 407--419 (2011; Zbl 1341.68045) Full Text: DOI
Neupane, Kashi; Steinwandt, Rainer Communication-efficient 2-round group key establishment from pairings. (English) Zbl 1284.94143 Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 65-76 (2011). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{K. Neupane} and \textit{R. Steinwandt}, Lect. Notes Comput. Sci. 6558, 65--76 (2011; Zbl 1284.94143) Full Text: DOI
Ren, Yanli; Gu, Dawu; Wang, Shuozhong; Zhang, Xinpeng New fuzzy identity-based encryption in the standard model. (English) Zbl 1213.68250 Informatica, Vilnius 21, No. 3, 393-408 (2010). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{Y. Ren} et al., Informatica, Vilnius 21, No. 3, 393--408 (2010; Zbl 1213.68250)
Kurosawa, Kaoru; Nojima, Ryo; Le Trieu Phong Efficiency-improved fully simulatable adaptive OT under the DDH assumption. (English) Zbl 1288.94069 Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 172-181 (2010). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{K. Kurosawa} et al., Lect. Notes Comput. Sci. 6280, 172--181 (2010; Zbl 1288.94069) Full Text: DOI
Jin, Zhengping; Wen, Qiaoyan; Du, Hongzhen An improved semantically-secure identity-based signcryption scheme in the standard model. (English) Zbl 1203.68047 Comput. Electr. Eng. 36, No. 3, 545-552 (2010). MSC: 68P25 94A62 PDFBibTeX XMLCite \textit{Z. Jin} et al., Comput. Electr. Eng. 36, No. 3, 545--552 (2010; Zbl 1203.68047) Full Text: DOI
Bhasin, Shivam; Guilley, Sylvain; Sauvage, Laurent; Danger, Jean-Luc Unrolling cryptographic circuits: a simple countermeasure against side-channel attacks. (English) Zbl 1390.94828 Pieprzyk, Josef (ed.), Topics in cryptology – CT-RSA 2010. The cryptographers’ track at the RSA conference 2010, San Francisco, CA, USA, March 1–5, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11924-8/pbk). Lecture Notes in Computer Science 5985, 195-207 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{S. Bhasin} et al., Lect. Notes Comput. Sci. 5985, 195--207 (2010; Zbl 1390.94828) Full Text: DOI
Guo, Yanzhen; Han, Wenbao; Zhao, Long; Liu, Jiaxiao AES mix-columns transformation. (Chinese. English summary) Zbl 1201.94088 J. PLA Univ. Sci. Technol., Nat. Sci. 10, No. 3, 232-236 (2009). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{Y. Guo} et al., J. PLA Univ. Sci. Technol., Nat. Sci. 10, No. 3, 232--236 (2009; Zbl 1201.94088)
Choudhary, Ashish; Krithivasan, Kamala Breaking the data encryption standard using networks of evolutionary processors with parallel string rewriting rules. (English) Zbl 1191.68360 Int. J. Comput. Math. 86, No. 4, 567-576 (2009). MSC: 68Q42 68Q05 68Q85 92B05 03H99 PDFBibTeX XMLCite \textit{A. Choudhary} and \textit{K. Krithivasan}, Int. J. Comput. Math. 86, No. 4, 567--576 (2009; Zbl 1191.68360) Full Text: DOI Link
Kazlauskas, Kazys; Kazlauskas, Jaunius Key-dependent S-box generation in AES block cipher system. (English) Zbl 1178.68227 Informatica, Vilnius 20, No. 1, 23-34 (2009). MSC: 68P25 PDFBibTeX XMLCite \textit{K. Kazlauskas} and \textit{J. Kazlauskas}, Informatica, Vilnius 20, No. 1, 23--34 (2009; Zbl 1178.68227) Full Text: Link Link
Zhang, Yazhe; Xu, Haixia; Li, Bao A deniable group key establishment protocol in standard model. (Chinese. English summary) Zbl 1199.68155 J. Wuhan Univ., Nat. Sci. Ed. 54, No. 5, 571-574 (2008). MSC: 68P25 68M12 94A62 PDFBibTeX XMLCite \textit{Y. Zhang} et al., J. Wuhan Univ., Nat. Sci. Ed. 54, No. 5, 571--574 (2008; Zbl 1199.68155)
Guo, Shanqing; Zeng, Yingpei; Wei, Juan; Xu, Qiuliang Attribute-based re-encryption scheme in the standard model. (English) Zbl 1199.68135 Wuhan Univ. J. Nat. Sci. 13, No. 5, 621-625 (2008). MSC: 68P25 68P30 PDFBibTeX XMLCite \textit{S. Guo} et al., Wuhan Univ. J. Nat. Sci. 13, No. 5, 621--625 (2008; Zbl 1199.68135) Full Text: DOI
Sun, Xun; Li, Jianhua; Chen, Gongliang; Wang, Yuehui; Yang, Shutang An identity based signature scheme with short public parameters in standard model. (Chinese. English summary) Zbl 1199.68145 J. Shanghai Jiaotong Univ. (Chin. Ed.) 42, No. 7, 1149-1153 (2008). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{X. Sun} et al., J. Shanghai Jiaotong Univ. (Chin. Ed.) 42, No. 7, 1149--1153 (2008; Zbl 1199.68145)
Weng, Jian; Chen, Kefei; Liu, Shengli; Li, Xiangxue Identity-based strong key-insulated signature without random oracles. (English) Zbl 1199.68150 J. Softw. 19, No. 6, 1555-1564 (2008). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. Weng} et al., J. Softw. 19, No. 6, 1555--1564 (2008; Zbl 1199.68150) Full Text: DOI
Joye, Marc An efficient on-line/off-line signature scheme without random oracles. (English) Zbl 1300.94110 Franklin, Matthew K. (ed.) et al., Cryptology and network security. 7th international conference, CANS 2008, Hong-Kong, China, December 2–4, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89640-1/pbk). Lecture Notes in Computer Science 5339, 98-107 (2008). MSC: 94A62 94A60 68P25 PDFBibTeX XMLCite \textit{M. Joye}, Lect. Notes Comput. Sci. 5339, 98--107 (2008; Zbl 1300.94110) Full Text: DOI
Chow, Sherman S. M.; Roth, Volker; Rieffel, Eleanor G. General certificateless encryption and timed-release encryption. (English) Zbl 1180.94050 Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 126-143 (2008). MSC: 94A60 68P25 94A62 PDFBibTeX XMLCite \textit{S. S. M. Chow} et al., Lect. Notes Comput. Sci. 5229, 126--143 (2008; Zbl 1180.94050) Full Text: DOI
Sun, Xun; Li, Jian-Hua; Yang, Shu-Tang; Chen, Gong-Liang Non-interactive identity-based threshold signature scheme without random oracles. (English) Zbl 1181.68147 J. Zhejiang Univ., Sci. A 9, No. 6, 727-736 (2008). MSC: 68P25 PDFBibTeX XMLCite \textit{X. Sun} et al., J. Zhejiang Univ., Sci. A 9, No. 6, 727--736 (2008; Zbl 1181.68147) Full Text: DOI
Tillich, Stefan; Herbst, Christoph Boosting AES performance on a tiny processor core. (English) Zbl 1153.68375 Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 170-186 (2008). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{S. Tillich} and \textit{C. Herbst}, Lect. Notes Comput. Sci. 4964, 170--186 (2008; Zbl 1153.68375) Full Text: DOI
Coppersmith, D.; Coron, J. S.; Grieu, F.; Halevi, S.; Jutla, C.; Naccache, D.; Stern, J. P. Cryptanalysis of ISO/IEC 9796-1. (English) Zbl 1146.68366 J. Cryptology 21, No. 1, 27-51 (2008). MSC: 68P25 PDFBibTeX XMLCite \textit{D. Coppersmith} et al., J. Cryptology 21, No. 1, 27--51 (2008; Zbl 1146.68366) Full Text: DOI
Zhang, Yu Cryptographic logical relations. (English) Zbl 1137.68024 Theor. Comput. Sci. 394, No. 1-2, 39-63 (2008). MSC: 68P25 03B40 03B70 03G30 18C15 94A60 PDFBibTeX XMLCite \textit{Y. Zhang}, Theor. Comput. Sci. 394, No. 1--2, 39--63 (2008; Zbl 1137.68024) Full Text: DOI
Liang, Xiaohui; Cao, Zhenfu; Shao, Jun; Lin, Huang Short group signature without random oracles. (English) Zbl 1285.94107 Qing, Sihan (ed.) et al., Information and communications security. 9th international conference, ICICS 2007, Zhengzhou, China, December 12–15, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77047-3/pbk). Lecture Notes in Computer Science 4861, 69-82 (2008). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{X. Liang} et al., Lect. Notes Comput. Sci. 4861, 69--82 (2008; Zbl 1285.94107) Full Text: DOI
Tillich, Stefan; Herbst, Christoph; Mangard, Stefan Protecting AES software implementations on 32-bit processors against power analysis. (English) Zbl 1214.68155 Katz, Jonathan (ed.) et al., Applied cryptography and network security. 5th international conference, ACNS 2007, Zhuhai, China, June 5–8, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72737-8/pbk). Lecture Notes in Computer Science 4521, 141-157 (2007). MSC: 68P25 PDFBibTeX XMLCite \textit{S. Tillich} et al., Lect. Notes Comput. Sci. 4521, 141--157 (2007; Zbl 1214.68155) Full Text: DOI
Yin, Yin; Li, Bao Provable secure encrypted key exchange protocol under standard models. (Chinese. English summary) Zbl 1174.68421 J. Softw. 18, No. 2, 422-429 (2007). MSC: 68P25 68M12 94A60 PDFBibTeX XMLCite \textit{Y. Yin} and \textit{B. Li}, J. Softw. 18, No. 2, 422--429 (2007; Zbl 1174.68421)
Chu, Cheng-Kang; Tzeng, Wen-Guey Identity-based proxy re-encryption without random oracles. (English) Zbl 1138.68404 Garay, Juan A. (ed.) et al., Information security. 10th international conference, ISC 2007, Valparaíso, Chile, October 9–12, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-75495-4/pbk). Lecture Notes in Computer Science 4779, 189-202 (2007). MSC: 68P25 PDFBibTeX XMLCite \textit{C.-K. Chu} and \textit{W.-G. Tzeng}, Lect. Notes Comput. Sci. 4779, 189--202 (2007; Zbl 1138.68404) Full Text: DOI
Wyseur, Brecht; Michiels, Wil; Gorissen, Paul; Preneel, Bart Cryptanalysis of white-box DES implementations with arbitrary external encodings. (English) Zbl 1154.94440 Adams, Carlisle (ed.) et al., Selected areas in cryptography. 14th international workshop, SAC 2007, Ottawa, Canada, August 16–17, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-77359-7/pbk). Lecture Notes in Computer Science 4876, 264-277 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Wyseur} et al., Lect. Notes Comput. Sci. 4876, 264--277 (2007; Zbl 1154.94440) Full Text: DOI
Feng, Dengguo; Chen, Weidong Modular approach to the design and analysis of password-based security protocols. (English) Zbl 1142.94011 Sci. China, Ser. F. 50, No. 3, 381-398 (2007). MSC: 94A60 68M12 68P25 PDFBibTeX XMLCite \textit{D. Feng} and \textit{W. Chen}, Sci. China, Ser. F 50, No. 3, 381--398 (2007; Zbl 1142.94011) Full Text: DOI
Phan, Raphael C.-W.; Yen, Sung-Ming Amplifying side-channel attacks with techniques from block cipher cryptanalysis. (English) Zbl 1333.94046 Domingo-Ferrer, Josep (ed.) et al., Smart card research and advanced applications. 7th IFIP WG 8.8/11.2 international conference, CARDIS 2006, Tarragona, Spain, April 19–21, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-33311-1/pbk; 978-3-540-33312-8/ebook). Lecture Notes in Computer Science 3928, 135-150 (2006). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{R. C. W. Phan} and \textit{S.-M. Yen}, Lect. Notes Comput. Sci. 3928, 135--150 (2006; Zbl 1333.94046) Full Text: DOI
Wang, Youren; Wang, Li; Yao, Rui; Zhang, Zhai; Cui, Jiang Dynamically reconfigurable encryption system of the AES. (English) Zbl 1120.68403 Wuhan Univ. J. Nat. Sci. 11, No. 6, 1569-1572 (2006). MSC: 68P25 PDFBibTeX XMLCite \textit{Y. Wang} et al., Wuhan Univ. J. Nat. Sci. 11, No. 6, 1569--1572 (2006; Zbl 1120.68403) Full Text: DOI
Zhu, Shuren Establishment of the secure channel between broker nodes in pub/sub system. (English) Zbl 1119.68078 Wuhan Univ. J. Nat. Sci. 11, No. 6, 1441-1444 (2006). MSC: 68P25 PDFBibTeX XMLCite \textit{S. Zhu}, Wuhan Univ. J. Nat. Sci. 11, No. 6, 1441--1444 (2006; Zbl 1119.68078) Full Text: DOI
Meng, Yang; Fu, Guangsheng Grover quantum algorithm and security analysis of DES. (Chinese. English summary) Zbl 1111.94331 J. Hunan Univ. Arts Sci., Nat. Sci. 18, No. 3, 78-79 (2006). MSC: 94A60 81P68 PDFBibTeX XMLCite \textit{Y. Meng} and \textit{G. Fu}, J. Hunan Univ. Arts Sci., Nat. Sci. 18, No. 3, 78--79 (2006; Zbl 1111.94331)
Grošek, Otakar; Magliveras, Spyros S.; Ťapuška, Ján; Wei, Wandi Is Rijndael really independent of the field polynomial? (English) Zbl 1174.68406 Tatra Mt. Math. Publ. 33, 51-69 (2006). Reviewer: Serweciński, Marcin (Katovice) MSC: 68P25 12E99 PDFBibTeX XMLCite \textit{O. Grošek} et al., Tatra Mt. Math. Publ. 33, 51--69 (2006; Zbl 1174.68406)
Lv, Jiqiang On two DES implementations secure against differential power analysis in smart-cards. (English) Zbl 1096.68050 Inf. Comput. 204, No. 7, 1179-1193 (2006). MSC: 68P25 PDFBibTeX XMLCite \textit{J. Lv}, Inf. Comput. 204, No. 7, 1179--1193 (2006; Zbl 1096.68050) Full Text: DOI
Laskari, E. C.; Meletiou, G. C.; Stamatiou, Y. C.; Vrahatis, M. N. Evolutionary computation based cryptanalysis: a first study. (English) Zbl 1202.94186 Nonlinear Anal., Theory Methods Appl., Ser. A, Theory Methods 63, No. 5-7, e823-e830 (2005). MSC: 94A60 90C59 PDFBibTeX XMLCite \textit{E. C. Laskari} et al., Nonlinear Anal., Theory Methods Appl., Ser. A, Theory Methods 63, No. 5--7, e823--e830 (2005; Zbl 1202.94186) Full Text: DOI
Phan, Raphael C.-W. Impossible differential cryptanalysis of 7-round advanced encryption standard (AES). (English) Zbl 1177.68087 Inf. Process. Lett. 91, No. 1, 33-38 (2004). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{R. C. W. Phan}, Inf. Process. Lett. 91, No. 1, 33--38 (2004; Zbl 1177.68087) Full Text: DOI
Feldhofer, Martin; Dominikus, Sandra; Wolkerstorfer, Johannes Strong authentication for RFID systems using the AES algorithm. (English) Zbl 1104.68471 Joye, Marc (ed.) et al., Cryptographic hardware and embedded systems – CHES 2004. 6th international workshop, Cambridge, MA, USA, August 11–13, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22666-4/pbk). Lecture Notes in Computer Science 3156, 357-370 (2004). MSC: 68P25 94A60 94A62 PDFBibTeX XMLCite \textit{M. Feldhofer} et al., Lect. Notes Comput. Sci. 3156, 357--370 (2004; Zbl 1104.68471) Full Text: DOI
Toli, Ilia; Zanoni, Alberto Looking inside \({\mathcal A}{\mathcal E}{\mathcal S}\) and \({\mathcal B}{\mathcal E}{\mathcal S}\). (English) Zbl 1088.68598 Levy, Jean-Jacques (ed.) et al., Exploring new frontiers of theoretical informatics. IFIP 18th world computer congress, TC1 3rd international conference on theoretical computer science (TCS2004), 22–27 August 2004, Toulouse, France. Boston, MA: Kluwer Academic Publishers (ISBN 1-4020-8140-5/hbk). IFIP, International Federation for Information Processing 155, 23-36 (2004). MSC: 68P25 13P10 68W30 PDFBibTeX XMLCite \textit{I. Toli} and \textit{A. Zanoni}, IFIP, Int. Fed. Inf. Process. 155, 23--36 (2004; Zbl 1088.68598)
Landau, Susan Polynomials in the Nation’s service: Using algebra to design the advanced encryption standard. (English) Zbl 1052.94017 Am. Math. Mon. 111, No. 2, 89-117 (2004). Reviewer: Lenka Fibikova (Sauerlach) MSC: 94A60 94-01 68P25 PDFBibTeX XMLCite \textit{S. Landau}, Am. Math. Mon. 111, No. 2, 89--117 (2004; Zbl 1052.94017) Full Text: DOI
Chun, Kilsoo; Kim, Seungjoo; Lee, Sangjin; Sung, Soo Hak; Yoon, Seonhee Differential and linear cryptanalysis for 2-round spns. (English) Zbl 1161.68438 Inf. Process. Lett. 87, No. 5, 277-282 (2003). MSC: 68P25 PDFBibTeX XMLCite \textit{K. Chun} et al., Inf. Process. Lett. 87, No. 5, 277--282 (2003; Zbl 1161.68438) Full Text: DOI
Wolkerstorfer, Johannes; Oswald, Elisabeth; Lamberger, Mario An ASIC implementation of the AES S-boxes. (English) Zbl 1045.68563 Preneel, Bart (ed.), Topics in cryptology - CT-RSA 2002. The cryptographers’ track at the RSA conference 2002, San José, CA, USA, February 18–22, 2002. Proceedings. Berlin: Springer (ISBN 3-540-43224-8). Lect. Notes Comput. Sci. 2271, 67-78 (2002). MSC: 68P25 94A60 11T71 94C05 PDFBibTeX XMLCite \textit{J. Wolkerstorfer} et al., Lect. Notes Comput. Sci. 2271, 67--78 (2002; Zbl 1045.68563) Full Text: Link
Daemen, Joan; Rijmen, Vincent Security of a wide trail design. (English) Zbl 1033.94519 Menezes, Alfred (ed.) et al., Progress in cryptology – INDOCRYPT 2002. Third international conference on cryptology in India, Hyderabad, India, December 16–18, 2002. Proceedings. Berlin: Springer (ISBN 3-540-00263-4/pbk). Lect. Notes Comput. Sci. 2551, 1-11 (2002). MSC: 94A60 68P25 68M07 PDFBibTeX XMLCite \textit{J. Daemen} and \textit{V. Rijmen}, Lect. Notes Comput. Sci. 2551, 1--11 (2002; Zbl 1033.94519) Full Text: Link
Murphy, Sean; Robshaw, Matthew J. B. Essential algebraic structure within the AES. (English) Zbl 1026.94537 Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 1-16 (2002). MSC: 94A60 11T71 68P25 PDFBibTeX XMLCite \textit{S. Murphy} and \textit{M. J. B. Robshaw}, Lect. Notes Comput. Sci. 2442, 1--16 (2002; Zbl 1026.94537) Full Text: Link
Biham, Eli How to decrypt or even substitute DES-encrypted messages in \(2^{28}\) steps. (English) Zbl 1042.68041 Inf. Process. Lett. 84, No. 3, 117-124 (2002). MSC: 68P25 PDFBibTeX XMLCite \textit{E. Biham}, Inf. Process. Lett. 84, No. 3, 117--124 (2002; Zbl 1042.68041) Full Text: DOI
Daemen, Joan; Rijmen, Vincent The design of Rijndael. AES – the Advanced Encryption Standard. (English) Zbl 1065.94005 Berlin: Springer (ISBN 3-540-42580-2/hbk). xvii, 238 p. (2002). MSC: 94A60 68P25 68-01 94-01 PDFBibTeX XMLCite \textit{J. Daemen} and \textit{V. Rijmen}, The design of Rijndael. AES -- the Advanced Encryption Standard. Berlin: Springer (2002; Zbl 1065.94005) Full Text: Link
Bezuschak, O. O. What is cryptography: codes composition, DES cryptosystem. (Ukrainian) Zbl 1224.94032 Sviti Mat. 7, No. 4, 2-10 (2001). Reviewer: A. Ya. Olenko (Kyïv) MSC: 94A60 11T71 PDFBibTeX XMLCite \textit{O. O. Bezuschak}, Sviti Mat. 7, No. 4, 2--10 (2001; Zbl 1224.94032)
Gennaro, Rosario; Jarecki, Stanisław; Krawczyk, Hugo; Rabin, Tal Robust threshold DSS signatures. (English) Zbl 1021.94527 Inf. Comput. 164, No. 1, 54-84 (2001). MSC: 94A62 68P25 91A12 94A60 PDFBibTeX XMLCite \textit{R. Gennaro} et al., Inf. Comput. 164, No. 1, 54--84 (2001; Zbl 1021.94527) Full Text: DOI
Messerges, Thomas S. Securing the AES finalists against power analysis attacks. (English) Zbl 0994.68633 Schneier, Bruce (ed.), Fast software encryption. 7th international workshop, FSE 2000, New York, NY, USA, April 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1978, 150-164 (2001). MSC: 68U99 68P25 94A60 PDFBibTeX XMLCite \textit{T. S. Messerges}, Lect. Notes Comput. Sci. 1978, 150--164 (2001; Zbl 0994.68633)
Knudsen, Lars R.; Meier, Willi Correlations in RC6 with a reduced number of rounds. (English) Zbl 0994.68634 Schneier, Bruce (ed.), Fast software encryption. 7th international workshop, FSE 2000, New York, NY, USA, April 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1978, 94-108 (2001). MSC: 68U99 68P25 94A60 62P99 PDFBibTeX XMLCite \textit{L. R. Knudsen} and \textit{W. Meier}, Lect. Notes Comput. Sci. 1978, 94--108 (2001; Zbl 0994.68634)
Landau, S. Communications security for the twenty-first century: The advanced encryption standard. (Russian) Zbl 1030.94504 Obozr. Prikl. Prom. Mat. 7, No. 2, 259-281 (2000). MSC: 94A60 11T71 68P25 94B05 PDFBibTeX XMLCite \textit{S. Landau}, Obozr. Prikl. Prom. Mat. 7, No. 2, 259--281 (2000; Zbl 1030.94504)
Landau, S. Standing the test of time: The data encryption standard. (Russian) Zbl 1030.94500 Obozr. Prikl. Prom. Mat. 7, No. 2, 240-258 (2000). MSC: 94-03 01A60 94A60 PDFBibTeX XMLCite \textit{S. Landau}, Obozr. Prikl. Prom. Mat. 7, No. 2, 240--258 (2000; Zbl 1030.94500)
Landau, Susan Standing the test of time: The data encryption standard. (English) Zbl 0987.94500 Notices Am. Math. Soc. 47, No. 3, 341-349 (2000). MSC: 94-03 01A60 94A60 PDFBibTeX XMLCite \textit{S. Landau}, Notices Am. Math. Soc. 47, No. 3, 341--349 (2000; Zbl 0987.94500)
Hwang, Min-Shiang A new redundancy reducing cipher. (English) Zbl 0995.94032 Informatica, Vilnius 11, No. 4, 435-440 (2000). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{M.-S. Hwang}, Informatica, Vilnius 11, No. 4, 435--440 (2000; Zbl 0995.94032)
Handschuh, Helena; Vaudenay, Serge A universal encryption standard. (English) Zbl 0993.94548 Heys, Howard (ed.) et al., Selected areas in cryptography. 6th annual international workshop, SAC ’99. Kingston, Ontario, Canada, August 9-10, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1758, 1-12 (2000). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{H. Handschuh} and \textit{S. Vaudenay}, Lect. Notes Comput. Sci. 1758, 1--12 (2000; Zbl 0993.94548)
Fiat, Amos; Naor, Moni Rigorous time/space trade-offs for inverting functions. (English) Zbl 0941.68002 SIAM J. Comput. 29, No. 3, 790-803 (2000). MSC: 68Q25 68P25 68W20 94A60 PDFBibTeX XMLCite \textit{A. Fiat} and \textit{M. Naor}, SIAM J. Comput. 29, No. 3, 790--803 (2000; Zbl 0941.68002) Full Text: DOI