-
2
-
-
33746077698
-
QUAD: A practical stream cipher with provable security
-
S. Vaudenay, editor LNCS Springer-Verlag
-
C. Berbain, H. Gilbert, and J. Patarin. QUAD: A Practical Stream Cipher with Provable Security. In S. Vaudenay, editor, Proceedi ngs of Eurocrypt 2006, LNCS, volume 4004, pages 109-128, Springer-Verlag, 2006.
-
(2006)
Proceedi Ngs of Eurocrypt 2006
, vol.4004
, pp. 109-128
-
-
Berbain, C.1
Gilbert, H.2
Patarin, J.3
-
4
-
-
33745626422
-
Improved time-memory trade-offs with multiple data
-
B. Preneel and S. Tavares, editors LNCS Springer Verlag
-
A. Biryukov, S. Mukhopadhyay, and P. Sarkar. Improved Time-memory Trade-offs with Multiple Data. In B. Preneel and S. Tavares, editors, Proceedi ngs of SAC 2005, LNCS, volume 3897, pages 110-127, Springer Verlag.
-
Proceedi Ngs of SAC 2005
, vol.3897
, pp. 110-127
-
-
Biryukov, A.1
Mukhopadhyay, S.2
Sarkar, P.3
-
6
-
-
33646807471
-
An analysis of the XSL algorithm
-
B. Roy, editor LNCS Springer-Verlag
-
C. Cid and G. Leurent. An Analysis of the XSL Algorithm. In B. Roy, editor, Proceedings of Asiacrypt 2005, LNCS, volume 3788, pages 333-352, Springer-Verlag, 2005.
-
(2005)
Proceedings of Asiacrypt 2005
, vol.3788
, pp. 333-352
-
-
Cid, C.1
Leurent, G.2
-
7
-
-
26444546862
-
Small scale variants of the AES
-
H. Gilbert and H. Handschuh, editors LNCS Springer-Verlag
-
C. Cid, S. Murphy, and M.J.B. Robshaw. Small Scale Variants of the AES. In H. Gilbert and H. Handschuh, editors, Proceedings of FSE 2005, LNCS, volume 3557, pages 145-162, Springer-Verlag, 2005.
-
(2005)
Proceedings of FSE 2005
, vol.3557
, pp. 145-162
-
-
Cid, C.1
Murphy, S.2
Robshaw, M.J.B.3
-
8
-
-
33746095782
-
VSH, an efficient and provable collision-resistant hash function
-
S. Vaudenay, editor LNCS Springer-Verlag
-
S. Contini, A.K. Lenstra, and R. Steinfeld. VSH, an Efficient and Provable Collision-Resistant Hash Function. In S. Vaudenay, editor, Proceedings of Eurocrypt 2006, LNCS, volume 4004, pages 165-182, Springer-Verlag, 2006.
-
(2006)
Proceedings of Eurocrypt 2006
, vol.4004
, pp. 165-182
-
-
Contini, S.1
Lenstra, A.K.2
Steinfeld, R.3
-
9
-
-
84958765510
-
Cryptanalysis of block ciphers with overdefined systems of equations
-
Y. Zheng, editor LNCS Springer-Verlag
-
N. Courtois and J. Pieprzyk. Cryptanalysis of Block Ciphers with Overdefined Systems of Equations. In Y. Zheng, editor, Proceedings of Asiacrypt 2002, LNCS, volume 2501, pages 267-287, Springer-Verlag, 2002.
-
(2002)
Proceedings of Asiacrypt 2002
, vol.2501
, pp. 267-287
-
-
Courtois, N.1
Pieprzyk, J.2
-
10
-
-
84947444236
-
The block cipher square
-
E. Biham, editor LNCS Springer-Verlag
-
J. Daemen, L. Knudsen, and V. Rijmen. The Block Cipher Square. In E. Biham, editor, Proceedi ngs of FSE '97, LNCS, volume 1267, pages 149-165, Springer-Verlag, 1997.
-
(1997)
Proceedi Ngs of FSE '97
, vol.1267
, pp. 149-165
-
-
Daemen, J.1
Knudsen, L.2
Rijmen, V.3
-
11
-
-
84887315591
-
-
The Stream Cipher Project: eSTREAM
-
ECRYPT Network of Excellence. The Stream Cipher Project: eSTREAM. Available via www.ecrypt.eu.org/stream.
-
ECRYPT Network of Excellence
-
-
-
12
-
-
35048859848
-
Strong authentication for RFID systems using the AES algorithm
-
M. Joye and J.-J. Quisquater, editors LNCS Springer Verlag
-
M. Feldhofer, S. Dominikus, and J. Wolkerstorfer. Strong Authentication for RFID Systems Using the AES algorithm. In M. Joye and J.-J. Quisquater, editors, Proceedings of CHES 2004, LNCS, volume 3156, pages 357-370, Springer Verlag, 2004.
-
(2004)
Proceedings of CHES 2004
, vol.3156
, pp. 357-370
-
-
Feldhofer, M.1
Dominikus, S.2
Wolkerstorfer, J.3
-
14
-
-
85043791322
-
An identity-based identification scheme based on discrete logarithms modulo a composite number
-
I. Damgård, editor LNCS Springer-Verlag
-
M. Girault. An Identity-based Identification Scheme Based on Discrete Logarithms Modulo a Composite Number. In I. Damgård, editor, Proceedings of Eurocrypt '90, LNCS, Volume 473, pages 481-486, Springer-Verlag, 1990.
-
(1990)
Proceedings of Eurocrypt '90
, vol.473
, pp. 481-486
-
-
Girault, M.1
-
17
-
-
84944045582
-
Yarrow-160: Notes on the design and analysis of the yarrow cryptographic pseudorandom number generator
-
H. Heyes and C. Adams, editors LNCS Springer-Verlag
-
J. Kelsey, B. Schneier, and N. Ferguson. Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. In H. Heyes and C. Adams, editors, Proceedings of SAC 1999, LNCS, volume 1758, pages 13-33, Springer-Verlag, 1999.
-
(1999)
Proceedings of SAC 1999
, vol.1758
, pp. 13-33
-
-
Kelsey, J.1
Schneier, B.2
Ferguson, N.3
-
18
-
-
33744929155
-
Mcrypton - A lightweight block cipher for security of low-cost RFID tags and sensors
-
J. Song, T. Kwon, and M. Yung, editors LNCS Springer-Verlag
-
C. Lim and T. Korkishko. mCrypton - A Lightweight Block Cipher for Security of Low-cost RFID Tags and Sensors. In J. Song, T. Kwon, and M. Yung, editors, Workshop on Information Security Applications - WISA'05, LNCS, volume 3786, pages 243-258, Springer-Verlag, 2005.
-
(2005)
Workshop on Information Security Applications - WISA'05
, vol.3786
, pp. 243-258
-
-
Lim, C.1
Korkishko, T.2
-
19
-
-
85028754650
-
First experimental cryptanalysis of the data encryption standard
-
Y. Desmedt, editor LNCS Springer-Verlag
-
M. Matsui. First Experimental Cryptanalysis of the Data Encryption Standard. In Y. Desmedt, editor, Proceedings of Crypto '94, LNCS, Volume 839, pages 1-11, Springer-Verlag, 1994.
-
(1994)
Proceedings of Crypto '94
, vol.839
, pp. 1-11
-
-
Matsui, M.1
-
20
-
-
4043135942
-
-
August
-
National Institute of Standards and Technology. FIPS 180-2: Secure Hash Standard, August 2002. Available via csrc.nist.gov.
-
(2002)
FIPS 180-2: Secure Hash Standard
-
-
-
21
-
-
3042644992
-
-
November
-
National Institute of Standards and Technology. FIPS 197: Advanced Encryption Standard, November 2001. Available via csrc.nist.gov.
-
(2001)
FIPS 197: Advanced Encryption Standard
-
-
-
22
-
-
84957640282
-
Secuity analysis of a practical "on the fly" authentication and signature generation
-
K. Nyberg, editor LNCS Springer-Verlag
-
G. Poupard and J. Stern. Secuity Analysis of a Practical "on the fly" Authentication and Signature Generation. In K. Nyberg, editor, Proceedings of Eurocrypt '98, LNCS, volume 1403, pages 422-436, Springer-Verlag, 1998.
-
(1998)
Proceedings of Eurocrypt '98
, vol.1403
, pp. 422-436
-
-
Poupard, G.1
Stern, J.2
-
24
-
-
33745777809
-
SEA: A scalable encryption algorithm for small embedded applications
-
J. Domingo-Ferrer, J. Posegga, and D. Schreckling, editors LNCS Springer-Verlag
-
F.-X. Standaert, G. Piret, N. Gershenfeld, and J.-J. Quisquater. SEA: A Scalable Encryption Algorithm for Small Embedded Applications. In J. Domingo-Ferrer, J. Posegga, and D. Schreckling, editors, Smart Card Research and Applications, Proceedings of CARDIS 2006, LNCS, volume 3928, pages 222-236, Springer-Verlag.
-
Smart Card Research and Applications, Proceedings of CARDIS 2006
, vol.3928
, pp. 222-236
-
-
Standaert, F.-X.1
Piret, G.2
Gershenfeld, N.3
Quisquater, J.-J.4
-
25
-
-
84869815133
-
TEA, a tiny encryption algorithm
-
B. Preneel, editor LNCS Springer-Verlag
-
D. Wheeler and R. Needham. TEA, a Tiny Encryption Algorithm. In B. Preneel, editor, Proceedi ngs of FSE 1994, LNCS, volume 1008, pages 363-366, Springer-Verlag, 1994.
-
(1994)
Proceedi Ngs of FSE 1994
, vol.1008
, pp. 363-366
-
-
Wheeler, D.1
Needham, R.2
-
26
-
-
15744395962
-
-
October Correction to XTEA. October
-
D. Wheeler and R. Needham. TEA extensions. October, 1997. (Also Correction to XTEA. October, 1998.) Available via www.ftp.cl.cam.ac.uk/ftp/ users/djw3/.
-
(1997)
TEA Extensions
-
-
Wheeler, D.1
Needham, R.2
|