default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 32 matches
- 2015
- Carlos Cid, Christian Rechberger:
Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers. Lecture Notes in Computer Science 8540, Springer 2015, ISBN 978-3-662-46705-3 [contents] - 2014
- Abhishek Banerjee, Hai Brenner, Gaëtan Leurent, Chris Peikert, Alon Rosen:
SPRING: Fast Pseudorandom Functions from Rounded Ring Products. FSE 2014: 38-57 - Jian Guo, Yu Sasaki, Lei Wang, Meiqin Wang, Long Wen:
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds. FSE 2014: 571-590 - Farzaneh Abed, Scott R. Fluhrer, Christian Forler, Eik List, Stefan Lucks, David A. McGrew, Jakob Wenzel:
Pipelineable On-line Encryption. FSE 2014: 205-223 - Farzaneh Abed, Eik List, Stefan Lucks, Jakob Wenzel:
Differential Cryptanalysis of Round-Reduced Simon and Speck. FSE 2014: 525-545 - Elena Andreeva, Begül Bilgin, Andrey Bogdanov, Atul Luykx, Bart Mennink, Nicky Mouha, Kan Yasuda:
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography. FSE 2014: 168-186 - Elena Andreeva, Atul Luykx, Bart Mennink, Kan Yasuda:
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse. FSE 2014: 187-204 - Daniel Augot, Matthieu Finiasz:
Direct Construction of Recursive MDS Diffusion Layers Using Shortened BCH Codes. FSE 2014: 3-17 - Manuel Barbosa, Pooya Farshim:
The Related-Key Analysis of Feistel Constructions. FSE 2014: 265-284 - Alex Biryukov, Arnab Roy, Vesselin Velichkov:
Differential Analysis of Block Ciphers SIMON and SPECK. FSE 2014: 546-570 - Céline Blondeau, Gregor Leander, Kaisa Nyberg:
Differential-Linear Cryptanalysis Revisited. FSE 2014: 411-430 - Alexandra Boldyreva, Nathan Chenette:
Efficient Fuzzy Search on Encrypted Data. FSE 2014: 613-633 - Anne Canteaut, Thomas Fuhr, Henri Gilbert, María Naya-Plasencia, Jean-René Reinhard:
Multiple Differential Cryptanalysis of Round-Reduced PRINCE. FSE 2014: 591-610 - Benoit Cogliati, Rodolphe Lampe, Jacques Patarin:
The Indistinguishability of the XOR of k Permutations. FSE 2014: 285-302 - Itai Dinur, Orr Dunkelman, Nathan Keller, Adi Shamir:
Improved Linear Sieving Techniques with Applications to Step-Reduced LED-64. FSE 2014: 390-410 - Itai Dinur, Jérémy Jean:
Cryptanalysis of FIDES. FSE 2014: 224-240 - Maria Eichlseder, Florian Mendel, Martin Schläffer:
Branching Heuristics in Differential Collision Search with Applications to SHA-512. FSE 2014: 473-488 - Thomas Fuhr, Brice Minaud:
Match Box Meet-in-the-Middle Attack Against KATAN. FSE 2014: 61-81 - Vincent Grosso, Gaëtan Leurent, François-Xavier Standaert, Kerem Varici:
LS-Designs: Bitslice Encryption for Efficient Masked Software Implementations. FSE 2014: 18-37 - Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, Santanu Sarkar:
Dependence in IV-Related Bytes of RC4 Key Enhances Vulnerabilities in WPA. FSE 2014: 350-369 - Takanori Isobe, Kyoji Shibutani:
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers. FSE 2014: 104-126 - Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka:
CLOC: Authenticated Encryption for Short Input. FSE 2014: 149-167 - Tetsu Iwata, Lei Wang:
Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs. FSE 2014: 303-322 - Virginie Lallemand, María Naya-Plasencia:
Cryptanalysis of KLEIN. FSE 2014: 451-470 - Rodolphe Lampe, Yannick Seurin:
Security Analysis of Key-Alternating Feistel Ciphers. FSE 2014: 243-264 - Leibo Li, Keting Jia, Xiaoyun Wang:
Improved Single-Key Attacks on 9-Round AES-192/256. FSE 2014: 127-146 - Guo-qiang Liu, Chen-Hui Jin, Chuan-Da Qi:
Improved Slender-Set Linear Cryptanalysis. FSE 2014: 431-450 - Florian Mendel, Vincent Rijmen, Martin Schläffer:
Collision Attack on 5 Rounds of Grøstl. FSE 2014: 509-521 - Mridul Nandi:
On the Minimum Number of Multiplications Necessary for Universal Hash Functions. FSE 2014: 489-508 - Kenneth G. Paterson, Bertram Poettering, Jacob C. N. Schuldt:
Plaintext Recovery Attacks Against WPA/TKIP. FSE 2014: 325-349
skipping 2 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-30 17:39 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint