The SCEAS System
Navigation Menu

Conferences in DBLP

Fast Software Encryption (FSE) (fse)
2006 (conf/fse/2006)

  1. Thomas Johansson, Willi Meier, Frédéric Muller
    Cryptanalysis of Achterbahn. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:1-14 [Conf]
  2. Côme Berbain, Henri Gilbert, Alexander Maximov
    Cryptanalysis of Grain. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:15-29 [Conf]
  3. Hongjun Wu, Bart Preneel
    Cryptanalysis of the Stream Cipher DECIM. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:30-40 [Conf]
  4. Taizo Shirai, Kyoji Shibutani
    On Feistel Structures Using a Diffusion Switching Mechanism. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:41-56 [Conf]
  5. Louis Granboulan, Éric Levieil, Gilles Piret
    Pseudorandom Permutation Families over Abelian Groups. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:57-77 [Conf]
  6. Johannes Buchmann, Andrei Pyshkin, Ralf-Philipp Weinmann
    A Zero-Dimensional Gröbner Basis for AES-128. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:78-88 [Conf]
  7. Hongbo Yu, Xiaoyun Wang, Aaram Yun, Sangwoo Park
    Cryptanalysis of the Full HAVAL with 4 and 5 Passes. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:89-110 [Conf]
  8. John Kelsey, Stefan Lucks
    Collisions and Near-Collisions for Reduced-Round Tiger. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:111-125 [Conf]
  9. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    Analysis of Step-Reduced SHA-256. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:126-143 [Conf]
  10. Kaisa Nyberg, Johan Wallén
    Improved Linear Distinguishers for SNOW 2.0. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:144-162 [Conf]
  11. Matthias Krause, Dirk Stegemann
    Reducing the Space Complexity of BDD-Based Attacks on Keystream Generators. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:163-178 [Conf]
  12. Jonathan J. Hoch, Adi Shamir
    Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:179-194 [Conf]
  13. Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee, Seokhie Hong, Jaesang Lee, Dukjae Moon, Sungtaek Chee
    A New Dedicated 256-Bit Hash Function: FORK-256. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:195-209 [Conf]
  14. Shoichi Hirose
    Some Plausible Constructions of Double-Block-Length Hash Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:210-225 [Conf]
  15. Kazuhiko Minematsu, Yukiyasu Tsunoo
    Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:226-241 [Conf]
  16. Martin Schläffer, Elisabeth Oswald
    Searching for Differential Paths in MD4. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:242-261 [Conf]
  17. John Black, Martin Cochran, Trevor Highland
    A Study of the MD5 Attacks: Insights and Improvements. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:262-277 [Conf]
  18. Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen
    The Impact of Carries on the Complexity of Collision Attacks on SHA-1. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:278-292 [Conf]
  19. Debrup Chakraborty, Palash Sarkar
    A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:293-309 [Conf]
  20. Tetsu Iwata
    New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:310-327 [Conf]
  21. John Black
    The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:328-340 [Conf]
  22. Mitsuru Matsui
    How Far Can We Go on the x64 Processors? [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:341-358 [Conf]
  23. Frédéric Didier, Jean-Pierre Tillich
    Computing the Algebraic Immunity Efficiently. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:359-374 [Conf]
  24. Yassir Nawaz, Guang Gong, Kishan Chand Gupta
    Upper Bounds on Algebraic Immunity of Boolean Power Functions. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:375-389 [Conf]
  25. Antoine Joux, Frédéric Muller
    Chosen-Ciphertext Attacks Against MOSQUITO. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:390-404 [Conf]
  26. Souradyuti Paul, Bart Preneel, Gautham Sekar
    Distinguishing Attacks on the Stream Cipher Py. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:405-421 [Conf]
  27. Hongjun Wu, Bart Preneel
    Resynchronization Attacks on WG and LEX. [Citation Graph (0, 0)][DBLP]
    FSE, 2006, pp:422-432 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002