-
1
-
-
84937397479
-
Cryptanalysis of Stream Ciphers with Linear Masking
-
M. Yung, editor, Advances in Cryptology - Crypto'02, Springer
-
D. Coppersmith, S. Halevi, and C. Jutla. Cryptanalysis of Stream Ciphers with Linear Masking. In M. Yung, editor, Advances in Cryptology - Crypto'02, volume 2442 of Lectures Notes in Computer Science, pages 515-532. Springer, 2002.
-
(2002)
Lectures Notes in Computer Science
, vol.2442
, pp. 515-532
-
-
Coppersmith, D.1
Halevi, S.2
Jutla, C.3
-
3
-
-
84949479756
-
Distinguishing Attacks on SOBER-t16 and t32
-
J. Daemen and V. Rijmen, editors, Fast Software Encryption - 2002, Springer
-
P. Ekdahl and T. Johansson. Distinguishing Attacks on SOBER-t16 and t32. In J. Daemen and V. Rijmen, editors, Fast Software Encryption - 2002, volume 2365 of Lectures Notes in Computer Science, pages 210-224. Springer, 2002.
-
(2002)
Lectures Notes in Computer Science
, vol.2365
, pp. 210-224
-
-
Ekdahl, P.1
Johansson, T.2
-
5
-
-
3543071325
-
Helix, Fast Encryption and Authentication in a Single Cryptographic Primitive
-
T. Johansson, editor
-
N. Ferguson, D. Whiting, B. Schneier, J. Kelsey, S. Lucks, and T. Kohno. Helix, Fast Encryption and Authentication in a Single Cryptographic Primitive. In T. Johansson, editor, Fast Software Encryption - 2003, 2003. To appear.
-
(2003)
Fast Software Encryption - 2003
-
-
Ferguson, N.1
Whiting, D.2
Schneier, B.3
Kelsey, J.4
Lucks, S.5
Kohno, T.6
-
7
-
-
84958984550
-
Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family
-
M. Matsui, editor, Fast Software Encryption - 2001, Springer
-
S. Fluhrer. Cryptanalysis of the SEAL 3.0 Pseudorandom Function Family. In M. Matsui, editor, Fast Software Encryption - 2001, volume 2355 of Lectures Notes in Computer Science, pages 135-143. Springer, 2001.
-
(2001)
Lectures Notes in Computer Science
, vol.2355
, pp. 135-143
-
-
Fluhrer, S.1
-
8
-
-
84949223752
-
Weaknesses in the Key Scheduling Algorithm of RC4
-
S. Vaudenay and A. M. Youssef, editors, Selected Areas in Cryptography - 2001, Springer
-
S. Fluhrer, I. Mantin, and A. Shamir. Weaknesses in the Key Scheduling Algorithm of RC4. In S. Vaudenay and A. M. Youssef, editors, Selected Areas in Cryptography - 2001, volume 2259 of Lectures Notes in Computer Science, pages 1-24. Springer, 2001.
-
(2001)
Lectures Notes in Computer Science
, vol.2259
, pp. 1-24
-
-
Fluhrer, S.1
Mantin, I.2
Shamir, A.3
-
9
-
-
84958968987
-
Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes
-
M. Matsui, editor, Fast Software Encryption - 2001, Springer
-
V. D. Gligor and P. Donescu. Fast Encryption and Authentication: XCBC Encryption and XECB Authentication Modes. In M. Matsui, editor, Fast Software Encryption - 2001, volume 2355 of Lectures Notes in Computer Science, pages 192-108. Springer, 2001.
-
(2001)
Lectures Notes in Computer Science
, vol.2355
, pp. 192-1108
-
-
Gligor, V.D.1
Donescu, P.2
-
10
-
-
84949426591
-
Scream: A Software-efficient Stream Cipher
-
L. Knudsen, editor, Fast Software Encryption - 2002, Springer
-
S. Halevi, D. Coppersmith, and C. Jutla. Scream : a Software-efficient Stream Cipher. In L. Knudsen, editor, Fast Software Encryption - 2002, volume 2332 of Lectures Notes in Computer Science, pages 195-209. Springer, 2002.
-
(2002)
Lectures Notes in Computer Science
, vol.2332
, pp. 195-209
-
-
Halevi, S.1
Coppersmith, D.2
Jutla, C.3
-
11
-
-
33646787968
-
Primitive Specification and Supporting Documentation for SOBER-t32
-
Submission to NESSIE
-
P. Hawkes and G. Rose. Primitive Specification and Supporting Documentation for SOBER-t32. In First Open NESSIE Workshop, 2000. Submission to NESSIE.
-
(2000)
First Open NESSIE Workshop
-
-
Hawkes, P.1
Rose, G.2
-
12
-
-
84945137421
-
Encryption Modes with Almost Free Message Integrity
-
B. Pfitzmann, editor, Advances in Cryptology - Eurocrypt'01, Springer
-
C. Jutla. Encryption Modes with Almost Free Message Integrity. In B. Pfitzmann, editor, Advances in Cryptology - Eurocrypt'01, volume 2045 of Lectures Notes in Computer Science, pages 529-544. Springer, 2001.
-
(2001)
Lectures Notes in Computer Science
, vol.2045
, pp. 529-544
-
-
Jutla, C.1
-
13
-
-
84958984270
-
Efficient Algorithms for Computing Differential Properties of Addition
-
M. Matsui, editor, Fast Software Encryption - 2001, Springer
-
H. Lipmaa and S. Moriai. Efficient Algorithms for Computing Differential Properties of Addition. In M. Matsui, editor, Fast Software Encryption - 2001, volume 2355 of Lectures Notes in Computer Science, pages 336-350. Springer, 2001.
-
(2001)
Lectures Notes in Computer Science
, vol.2355
, pp. 336-350
-
-
Lipmaa, H.1
Moriai, S.2
-
15
-
-
0035750947
-
OCB/ a Block-cipher Mode of Operation for Efficient Authenticated Encryption
-
ACM Press
-
P. Rogaway, M. Bellare, J. Black, and T. Krovetz. OCB/ A Block-cipher Mode of Operation for Efficient Authenticated Encryption. In Eight ACM Conference on Computer and Communications Security (CCS-8), pages 196-205. ACM Press, 2001.
-
(2001)
Eight ACM Conference on Computer and Communications Security (CCS-8)
, pp. 196-205
-
-
Rogaway, P.1
Bellare, M.2
Black, J.3
Krovetz, T.4
-
16
-
-
84994869893
-
A Software-optimized Encryption Algorithm
-
R. Anderson, editor, Fast Software Encryption - 1994, Springer-Verlag
-
P. Rogaway and D. Coppersmith. A Software-optimized Encryption Algorithm. In R. Anderson, editor, Fast Software Encryption - 1994, volume 809 of Lectures Notes in Computer Science, pages 56-63. Springer-Verlag, 1994.
-
(1994)
Lectures Notes in Computer Science
, vol.809
, pp. 56-63
-
-
Rogaway, P.1
Coppersmith, D.2
|