-
1
-
-
38349025206
-
-
Abe, M., Gennaro, R., Kurosawa, K.: Tag-KEM/DEM: A new framework for hybrid encryption. IACR ePrint archive 2005/027 (2005) Available at http://eprint.iacr.org/2005/027 Newer version in [2]
-
Abe, M., Gennaro, R., Kurosawa, K.: Tag-KEM/DEM: A new framework for hybrid encryption. IACR ePrint archive 2005/027 (2005) Available at http://eprint.iacr.org/2005/027 Newer version in [2]
-
-
-
-
2
-
-
24944516264
-
-
Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, 3494, pp. 128-146. Springer, Heidelberg (2005) Older version in [1]
-
Abe, M., Gennaro, R., Kurosawa, K., Shoup, V.: Tag-KEM/DEM: A new framework for hybrid encryption and a new analysis of Kurosawa-Desmedt KEM. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 128-146. Springer, Heidelberg (2005) Older version in [1]
-
-
-
-
3
-
-
84888351423
-
On the pseudo-random generator ISAAC
-
Available at
-
Aumasson, J.-P.: On the pseudo-random generator ISAAC. IACR ePrint archive 2006/438 (2006). Available at http://eprint.iacr.org/2006/438
-
(2006)
IACR ePrint archive
, vol.2006
, Issue.438
-
-
Aumasson, J.-P.1
-
4
-
-
35048894397
-
How far can we go beyond linear cryptanalysis?
-
Lee, P.J, ed, ASIACRYPT 2004, Springer, Heidelberg
-
Baignères, T., Junod, P., Vaudenay, S.: How far can we go beyond linear cryptanalysis? In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol. 3329, pp. 432-450. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3329
, pp. 432-450
-
-
Baignères, T.1
Junod, P.2
Vaudenay, S.3
-
5
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
IEEE Computer Society, Los Alamitos
-
Bellare, M., Desai, A., Jokipii, E., Rogaway, P.: A concrete security treatment of symmetric encryption. In: Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS'97), p. 394. IEEE Computer Society, Los Alamitos (1997)
-
(1997)
Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS'97)
, pp. 394
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
6
-
-
0031675932
-
A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511
-
Canteaut, A., Chabaud, F.: A new algorithm for finding minimum-weight words in a linear code: Application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511. IEEE Transactions on Information Theory 44(1), 367-378 (1998)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.1
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
7
-
-
84948963512
-
-
Canteaut, A., Trabbia, M.: Improved fast correlation attacks using parity check equations of weight 4 and 5. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, 1807, pp. 573-588. Springer, Heidelberg (2000)
-
Canteaut, A., Trabbia, M.: Improved fast correlation attacks using parity check equations of weight 4 and 5. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 573-588. Springer, Heidelberg (2000)
-
-
-
-
8
-
-
84966220369
-
A new algorithm for factoring polynomials over finite fields
-
Cantor, D.G., Zassenhaus, H.: A new algorithm for factoring polynomials over finite fields. Mathematics of Computation 36(154), 587-592 (1981)
-
(1981)
Mathematics of Computation
, vol.36
, Issue.154
, pp. 587-592
-
-
Cantor, D.G.1
Zassenhaus, H.2
-
9
-
-
84974707578
-
Efficient software implementation of linear feedback shift registers
-
Pandu Rangan, C, Ding, C, eds, INDOCRYPT 2001, Springer, Heidelberg
-
Chowdhury, S., Maitra, S.: Efficient software implementation of linear feedback shift registers. In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol. 2247, pp. 297-307. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2247
, pp. 297-307
-
-
Chowdhury, S.1
Maitra, S.2
-
10
-
-
0242340669
-
-
Chowdhury, S., Maitra, S.: Efficient software implementation of LFSR and boolean function and its application in nonlinear combiner model. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, 2846, pp. 387-402. Springer, Heidelberg (2003)
-
Chowdhury, S., Maitra, S.: Efficient software implementation of LFSR and boolean function and its application in nonlinear combiner model. In: Zhou, J., Yung, M., Han, Y. (eds.) ACNS 2003. LNCS, vol. 2846, pp. 387-402. Springer, Heidelberg (2003)
-
-
-
-
14
-
-
34547417640
-
When stream cipher analysis meets public-key cryptography (invited talk)
-
the Proceedings of SAC, to appear
-
Finiasz, M., Vaudenay, S.: When stream cipher analysis meets public-key cryptography (invited talk). In: the Proceedings of SAC 2006, Lecture Notes in Computer Science (to appear)
-
(2006)
Lecture Notes in Computer Science
-
-
Finiasz, M.1
Vaudenay, S.2
-
15
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Wiener, M.J, ed, CRYPTO 1999, Springer, Heidelberg
-
Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537-554. Springer, Heidelberg (1999)
-
(1999)
LNCS
, vol.1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
16
-
-
33645191450
-
Multiples of primitive polynomials over GF
-
Pandu Rangan, C, Ding, C, eds, INDOCRYPT 2001, Springer, Heidelberg
-
Gupta, K.C., Maitra, S.: Multiples of primitive polynomials over GF(2). In: Pandu Rangan, C., Ding, C. (eds.) INDOCRYPT 2001. LNCS, vol. 2247, pp. 62-72. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2247
, pp. 62-72
-
-
Gupta, K.C.1
Maitra, S.2
-
17
-
-
84947808606
-
NTRU: A ring-based public key cryptosystem
-
Buhler, J.P, ed, Algorithmic Number Theory, Springer, Heidelberg
-
Hoffstein, J., Pipher, J., Silverman, J.H.: NTRU: A ring-based public key cryptosystem. In: Buhler, J.P. (ed.) Algorithmic Number Theory. LNCS, vol. 1423, pp. 267-288. Springer, Heidelberg (1998)
-
(1998)
LNCS
, vol.1423
, pp. 267-288
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.H.3
-
18
-
-
33645191994
-
On choice of connection-polynominals for LFSR-based stream ciphers
-
Roy, B, Okamoto, E, eds, INDOCRYPT 2000, Springer, Heidelberg
-
Jambunathan, K.: On choice of connection-polynominals for LFSR-based stream ciphers. In: Roy, B., Okamoto, E. (eds.) INDOCRYPT 2000. LNCS, vol. 1977, pp. 9-18. Springer, Heidelberg (2000)
-
(2000)
LNCS
, vol.1977
, pp. 9-18
-
-
Jambunathan, K.1
-
19
-
-
84958958085
-
Fast Software Encryption
-
Gollmann, D, ed, Springer, Heidelberg
-
Jenkins Jr., R.J.: ISAAC. In: Gollmann, D. (ed.) Fast Software Encryption. LNCS, vol. 1039, pp. 41-49. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1039
, pp. 41-49
-
-
Jenkins Jr., R.J.1
ISAAC2
-
20
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz, N.: Elliptic curve cryptosystems. Mathematics of Computation 48(177), 203-209 (1987)
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, N.1
-
21
-
-
85034651324
-
An observation on the security of McEliece's public-key cryptosystem
-
Günther, C.G, ed, EUROCRYPT 1988, Springer, Heidelberg
-
Lee, P.J., Brickell, E.F.: An observation on the security of McEliece's public-key cryptosystem. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 275-280. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.330
, pp. 275-280
-
-
Lee, P.J.1
Brickell, E.F.2
-
22
-
-
23844532560
-
Results on multiples of primitive polynomials and their products over GF(2)
-
Maitra, S., Gupta, K.C., Venkateswarlu, A.: Results on multiples of primitive polynomials and their products over GF(2). Theoretical Computer Science 341(1-3), 311-343 (2005)
-
(2005)
Theoretical Computer Science
, vol.341
, Issue.1-3
, pp. 311-343
-
-
Maitra, S.1
Gupta, K.C.2
Venkateswarlu, A.3
-
24
-
-
33745650569
-
Fast correlation attacks on stream ciphers
-
Günther, C.G, ed, EUROCRYPT 1988, Springer, Heidelberg
-
Meier, W., Staffelbach, O.: Fast correlation attacks on stream ciphers. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 301-314. Springer, Heidelberg (1988)
-
(1988)
LNCS
, vol.330
, pp. 301-314
-
-
Meier, W.1
Staffelbach, O.2
-
25
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Journal on Computing 26(5), 1484-1509 (1997)
-
(1997)
SIAM Journal on Computing
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
-
27
-
-
34547414125
-
RFID privacy based on public-key cryptography (invited talk)
-
Rhee, M.S, Lee, B, eds, ICISC 2006, Springer, Heidelberg
-
Vaudenay, S.: RFID privacy based on public-key cryptography (invited talk). In: Rhee, M.S., Lee, B. (eds.) ICISC 2006. LNCS, vol. 4296, pp. 1-6. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4296
, pp. 1-6
-
-
Vaudenay, S.1
-
28
-
-
84937428040
-
A generalized birthday problem
-
Yung, M, ed, CRYPTO 2002, Springer, Heidelberg
-
Wagner, D.: A generalized birthday problem. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 288-304. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2442
, pp. 288-304
-
-
Wagner, D.1
-
29
-
-
38349082811
-
High performance linear algebra operations on reconfigurable systems
-
Gschwind, T, Aßmann, U, Nierstrasz, O, eds, SC, Springer, Heidelberg
-
Zhuo, L., Prasanna, V.K.: High performance linear algebra operations on reconfigurable systems. In: Gschwind, T., Aßmann, U., Nierstrasz, O. (eds.) SC 2005. LNCS, vol. 3628, Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3628
-
-
Zhuo, L.1
Prasanna, V.K.2
|