Conferences in DBLP
Thomas Johansson , Willi Meier , Frédéric Muller Cryptanalysis of Achterbahn. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:1-14 [Conf ] Côme Berbain , Henri Gilbert , Alexander Maximov Cryptanalysis of Grain. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:15-29 [Conf ] Hongjun Wu , Bart Preneel Cryptanalysis of the Stream Cipher DECIM. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:30-40 [Conf ] Taizo Shirai , Kyoji Shibutani On Feistel Structures Using a Diffusion Switching Mechanism. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:41-56 [Conf ] Louis Granboulan , Éric Levieil , Gilles Piret Pseudorandom Permutation Families over Abelian Groups. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:57-77 [Conf ] Johannes Buchmann , Andrei Pyshkin , Ralf-Philipp Weinmann A Zero-Dimensional Gröbner Basis for AES-128. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:78-88 [Conf ] Hongbo Yu , Xiaoyun Wang , Aaram Yun , Sangwoo Park Cryptanalysis of the Full HAVAL with 4 and 5 Passes. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:89-110 [Conf ] John Kelsey , Stefan Lucks Collisions and Near-Collisions for Reduced-Round Tiger. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:111-125 [Conf ] Florian Mendel , Norbert Pramstaller , Christian Rechberger , Vincent Rijmen Analysis of Step-Reduced SHA-256. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:126-143 [Conf ] Kaisa Nyberg , Johan Wallén Improved Linear Distinguishers for SNOW 2.0. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:144-162 [Conf ] Matthias Krause , Dirk Stegemann Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:163-178 [Conf ] Jonathan J. Hoch , Adi Shamir Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:179-194 [Conf ] Deukjo Hong , Donghoon Chang , Jaechul Sung , Sangjin Lee , Seokhie Hong , Jaesang Lee , Dukjae Moon , Sungtaek Chee A New Dedicated 256-Bit Hash Function: FORK-256. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:195-209 [Conf ] Shoichi Hirose Some Plausible Constructions of Double-Block-Length Hash Functions. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:210-225 [Conf ] Kazuhiko Minematsu , Yukiyasu Tsunoo Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:226-241 [Conf ] Martin Schläffer , Elisabeth Oswald Searching for Differential Paths in MD4. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:242-261 [Conf ] John Black , Martin Cochran , Trevor Highland A Study of the MD5 Attacks: Insights and Improvements. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:262-277 [Conf ] Florian Mendel , Norbert Pramstaller , Christian Rechberger , Vincent Rijmen The Impact of Carries on the Complexity of Collision Attacks on SHA-1. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:278-292 [Conf ] Debrup Chakraborty , Palash Sarkar A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:293-309 [Conf ] Tetsu Iwata New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:310-327 [Conf ] John Black The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:328-340 [Conf ] Mitsuru Matsui How Far Can We Go on the x64 Processors? [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:341-358 [Conf ] Frédéric Didier , Jean-Pierre Tillich Computing the Algebraic Immunity Efficiently. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:359-374 [Conf ] Yassir Nawaz , Guang Gong , Kishan Chand Gupta Upper Bounds on Algebraic Immunity of Boolean Power Functions. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:375-389 [Conf ] Antoine Joux , Frédéric Muller Chosen-Ciphertext Attacks Against MOSQUITO. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:390-404 [Conf ] Souradyuti Paul , Bart Preneel , Gautham Sekar Distinguishing Attacks on the Stream Cipher Py. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:405-421 [Conf ] Hongjun Wu , Bart Preneel Resynchronization Attacks on WG and LEX. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:422-432 [Conf ]