-
1
-
-
0025535378
-
Simple construction of almost k-wise independent random variables
-
N. Alon, O. Goldreich, J. Håstad, and R. Peralta. Simple construction of almost k-wise independent random variables. Annual IEEE Symposium on Foundations of Computer Science, pages 544-553, 1990.
-
(1990)
Annual IEEE Symposium on Foundations of Computer Science
, pp. 544-553
-
-
Alon, N.1
Goldreich, O.2
Håstad, J.3
Peralta, R.4
-
3
-
-
77954695258
-
Lightweight privacy preserving authentication for RFID using a stream cipher
-
S. Hong and T. Iwata, editors, Fast Software Encryption 2010, Springer-Verlag
-
O. Billet, J. Etrog, and H. Gilbert. Lightweight privacy preserving authentication for RFID using a stream cipher. In S. Hong and T. Iwata, editors, Fast Software Encryption 2010, volume 6147 of Lecture Notes in Computer Science, pages 55-78. Springer-Verlag, 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6147
, pp. 55-78
-
-
Billet, O.1
Etrog, J.2
Gilbert, H.3
-
4
-
-
84957068240
-
UMAC: Fast and secure message authentication
-
Springer-Verlag
-
J. Black, S. Halevi, H. Krawczyk, T. Krovetz, and P. Rogaway. UMAC: Fast and secure message authentication. In Advances in Cryptology - CRYPTO'99, pages 215-233. Springer-Verlag, 1999.
-
(1999)
Advances in Cryptology - CRYPTO'99
, pp. 215-233
-
-
Black, J.1
Halevi, S.2
Krawczyk, H.3
Krovetz, T.4
Rogaway, P.5
-
5
-
-
48249107069
-
Trivium
-
M. Robshaw and O. Billet, editors, New Stream Cipher Designs, Springer-Verlag
-
C. De Cannière and B. Preneel. Trivium. In M. Robshaw and O. Billet, editors, New Stream Cipher Designs, volume 4986 of Lecture Notes in Computer Science, pages 244-266. Springer-Verlag, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.4986
, pp. 244-266
-
-
De Cannière, C.1
Preneel, B.2
-
6
-
-
0031675932
-
A new algorithm for finding minimum-weight words in a linear code: Application to mceliece's cryptosystem and to narrow-sense bch codes of length 511
-
PII S0018944898000182
-
A. Canteaut and F. Chabaud. A new algorithm for finding minimum-weight words in a linear code: application to McEliece's cryptosystem and to narrow-sense BCH codes of length 511. IEEE Transactions on Information Theory, 44:367-378, 1998. (Pubitemid 128737912)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.1
, pp. 367-378
-
-
Canteaut, A.1
Chabaud, F.2
-
7
-
-
0016038540
-
Codes which detect deception
-
E. N. Gilbert, F. J. MacWilliams, and N. J. A. Sloane. Codes which detect deception. Bell Systems Technical Journal, 53(3):405-424, 1974.
-
(1974)
Bell Systems Technical Journal
, vol.53
, Issue.3
, pp. 405-424
-
-
Gilbert, E.N.1
MacWilliams, F.J.2
Sloane, N.J.A.3
-
8
-
-
0030261891
-
Computation of low-weight parity-check polynomials
-
October
-
J. D. Golić. Computation of low-weight parity-check polynomials. Electronic Letters, 32(21):1981-1982, October 1996.
-
(1996)
Electronic Letters
, vol.32
, Issue.21
, pp. 1981-1982
-
-
Golić, J.D.1
-
9
-
-
51849140875
-
Key-recovery attacks on universal hash function based MAC algorithms
-
D. Wagner, editor, Advances in Cryptology - CRYPTO 2008, Springer-Verlag
-
H. Handschuh and B. Preneel. Key-recovery attacks on universal hash function based MAC algorithms. In D. Wagner, editor, Advances in Cryptology - CRYPTO 2008, volume 5157 of Lecture Notes in Computer Science, pages 144-161. Springer-Verlag, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5157
, pp. 144-161
-
-
Handschuh, H.1
Preneel, B.2
-
11
-
-
84886703527
-
Grain - A stream cipher for constrained environments
-
M. Hell, T. Johansson, and W. Meier. Grain - a stream cipher for constrained environments. International Journal of Wireless and Mobile Computing, Special Issue on Security of Computer Network and Mobile Systems., 2(1):86-93, 2006.
-
(2006)
International Journal of Wireless and Mobile Computing, Special Issue on Security of Computer Network and Mobile Systems
, vol.2
, Issue.1
, pp. 86-93
-
-
Hell, M.1
Johansson, T.2
Meier, W.3
-
12
-
-
84878363139
-
On the relation between A-codes and codes correcting independent errors
-
T. Helleseth, editor, Advances in Cryptology - EUROCRYPT'93 Springer-Verlag
-
T. Johansson, G. Kabatianskii, and B. Smeets. On the relation between A-codes and codes correcting independent errors. In T. Helleseth, editor, Advances in Cryptology - EUROCRYPT'93, volume 765 of Lecture Notes in Computer Science, pages 1-11. Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 1-11
-
-
Johansson, T.1
Kabatianskii, G.2
Smeets, B.3
-
13
-
-
84991939136
-
LFSR-based hashing and authentication
-
Springer-Verlag
-
H. Krawczyk. LFSR-based hashing and authentication. In Advances in Cryptology - CRYPTO'94, pages 129-139. Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology - CRYPTO'94
, pp. 129-139
-
-
Krawczyk, H.1
-
14
-
-
84957367286
-
New hash functions for message authentication
-
Springer-Verlag
-
H. Krawczyk. New hash functions for message authentication. In Advances in Cryptology - EUROCRYPT'95, pages 301-310. Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology - EUROCRYPT'95
, pp. 301-310
-
-
Krawczyk, H.1
-
15
-
-
0027869083
-
Learning decision trees using the fourier spectrum
-
E. Kushilevitz and Y. Mansour. Learning decision trees using the fourier spectrum. SIAM Journal on Computing, 22(6):1331-1348, 1993.
-
(1993)
SIAM Journal on Computing
, vol.22
, Issue.6
, pp. 1331-1348
-
-
Kushilevitz, E.1
Mansour, Y.2
-
16
-
-
85025704284
-
Linear cryptanalysis method for des cipher
-
T. Helleseth, editor, Advances in Cryptology - EUROCRYPT'93, Springer-Verlag
-
M. Matsui. Linear cryptanalysis method for DES cipher. In T. Helleseth, editor, Advances in Cryptology - EUROCRYPT'93, volume 765 of Lecture Notes in Computer Science, pages 386-397. Springer-Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 386-397
-
-
Matsui, M.1
-
17
-
-
0024860262
-
Fast correlation attacks on certain stream ciphers
-
W. Meier and O. Staffelbach. Fast correlation attacks on certain stream ciphers. Journal of Cryptology, 1(3):159-176, 1989.
-
(1989)
Journal of Cryptology
, vol.1
, Issue.3
, pp. 159-176
-
-
Meier, W.1
Staffelbach, O.2
-
18
-
-
0027641832
-
Small-bias probability spaces: Efficient constructions and applications
-
J. Naor and M. Naor. Small-bias probability spaces: Efficient constructions and applications. SIAM Journal on Computing, 22(4):838-856, 1993. (Pubitemid 23677151)
-
(1993)
SIAM Journal on Computing
, vol.22
, Issue.4
, pp. 838-856
-
-
Naor, J.1
Naor, M.2
-
19
-
-
84947926195
-
Computation of low-weight parity checks for correlation attacks on stream ciphers
-
C. Boyd, editor, Cryptography and Coding - 5th IMA Conference, Springer-Verlag
-
W.T. Penzhorn and G.J. Kühn. Computation of low-weight parity checks for correlation attacks on stream ciphers. In C. Boyd, editor, Cryptography and Coding - 5th IMA Conference, volume 1025 of Lecture Notes in Computer Science, pages 74-83. Springer-Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.1025
, pp. 74-83
-
-
Penzhorn, W.T.1
Kühn, G.J.2
-
20
-
-
0003038453
-
A survey of information authentication
-
G. J. Simmons, editor, IEEE Press
-
G. J. Simmons. A survey of information authentication. In G. J. Simmons, editor, Contemporary Cryptology, The Science of Information Integrity, pages 379-419. IEEE Press, 1992.
-
(1992)
Contemporary Cryptology, the Science of Information Integrity
, pp. 379-419
-
-
Simmons, G.J.1
-
21
-
-
71049183202
-
Universal hashing and authentication codes
-
J. Feigenbaum, editor, Advances in Cryptology - CRYPTO'91, Springer-Verlag
-
D. R. Stinson. Universal hashing and authentication codes. In J. Feigenbaum, editor, Advances in Cryptology - CRYPTO'91, volume 576 of Lecture Notes in Computer Science, pages 74-85. Springer-Verlag, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 74-85
-
-
Stinson, D.R.1
-
22
-
-
84937428040
-
A generalized birthday problem
-
M. Yung, editor, Advances in Cryptology - CRYPTO 2002, Springer-Verlag
-
D. Wagner. A generalized birthday problem. In M. Yung, editor, Advances in Cryptology - CRYPTO 2002, volume 2442 of Lecture Notes in Computer Science, pages 288-303. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2442
, pp. 288-303
-
-
Wagner, D.1
-
23
-
-
0019572642
-
NEW HASH FUNCTIONS and THEIR USE in AUTHENTICATION and SET EQUALITY
-
DOI 10.1016/0022-0000(81)90033-7
-
M. N. Wegman and J. L. Carter. New hash functions and their use in authentication and set equality. Journal of Computer and System Sciences, 22:265-279, 1981. (Pubitemid 12444638)
-
(1981)
Journal of Computer and System Sciences
, vol.22
, Issue.3
, pp. 265-279
-
-
Wegman, M.N.1
Carter, J.L.2
|