The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase CBC-mode (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1991-2002 (15) 2003-2007 (15) 2008-2016 (16) 2017-2023 (7)
Publication types (Num. hits)
article(18) inproceedings(35)
Venues (Conferences, Journals, ...)
CoRR(5) CRYPTO(5) FSE(4) EUROCRYPT(3) CHES(2) IACR Cryptol. ePrint Arch.(2) ACISP(1) AICCSA(1) ASIACRYPT(1) ATSIP(1) CANS(1) CCECE(1) CIS (2)(1) CSE/EUC/DCABES(1) CT-RSA(1) DATE(1) More (+10 of total 38)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 46 occurrences of 37 keywords

Results
Found 53 publication records. Showing 53 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
114Fengtong Wen, Wenling Wu, Qiaoyan Wen Error Oracle Attacks on Several Modes of Operation. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
110Chris J. Mitchell Error Oracle Attacks on CBC Mode: Is There a Future for CBC Mode Encryption? Search on Bibsonomy ISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
108Arnold K. L. Yau, Kenneth G. Paterson, Chris J. Mitchell Padding Oracle Attacks on CBC-Mode Encryption with Secret and Random IVs. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF padding oracle, CBC-mode, side channel, ISO standards
108Kenneth G. Paterson, Arnold K. L. Yau Padding Oracle Attacks on the ISO CBC Mode Encryption Standard. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF padding oracle attack, CBC-mode encryption, ISO standard
93Kenneth G. Paterson, Gaven J. Watson Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment. Search on Bibsonomy SCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
82Yevgeniy Dodis, Krzysztof Pietrzak, Prashant Puniya A New Mode of Operation for Block Ciphers and Length-Preserving MACs. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
72Keting Jia, Xiaoyun Wang 0001, Zheng Yuan, Guangwu Xu Distinguishing and Second-Preimage Attacks on CBC-Like MACs. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF CBC, MAC, Distinguishing attack, Second preimage attack
62Praveen Dongara, T. N. Vijaykumar Accelerating private-key cryptography via multithreading on symmetric multiprocessors. Search on Bibsonomy ISPASS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
59Ivan Damgård, Jesper Buus Nielsen Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
49Danilo Gligoroski, Suzana Andova, Svein J. Knapskog On the Importance of the Key Separation Principle for Different Modes of Operation. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF quasigroup string transformations, block ciphers, modes of operation
49Richard M. Dansereau, S. Jin, Rafik A. Goubran Reducing Packet Loss in CBC Secured VoIP using Interleaved Encryption. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Yuliang Zheng 0001, Yongge Wang Efficient and provably secure ciphers for storage device block level encryption. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF storage device encryption, hash function, symmetric cipher
42Véronique Cortier, Michaël Rusinowitch, Eugen Zalinescu A resolution strategy for verifying cryptographic protocols with CBC encryption and blind signatures. Search on Bibsonomy PPDP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF resolution strategies, verification, cryptographic protocols, horn clauses
36Eli Biham Cryptanalysis of Multiple Modes of Operation. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Block ciphers, Block ciphers, Modes of operation, Modes of operation, Key words, Multiple modes, Multiple modes
36Eli Biham Cryptanalysis of Multiple Modes of Operation. Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
33Sumio Morioka, Akashi Satoh A 10-Gbps full-AES crypto design with a twisted BDD S-Box architecture. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
33Sumio Morioka, Akashi Satoh A 10 Gbps Full-AES Crypto Design with a Twisted-BDD S-Box Architecture. Search on Bibsonomy ICCD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
27Zhanna Alimzhanova, Maria Skublewska-Paszkowska, Dauren Nazarbayev Periodicity Detection of the Substitution Box in the CBC Mode of Operation: Experiment and Study. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Punam Kumari, Bhaskar Mondal Lightweight image encryption algorithm using NLFSR and CBC mode. Search on Bibsonomy J. Supercomput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Yuanjian Li, Chunhe Song, Jingya Dong, Hao Zheng An efficient encryption method for smart grid data based on improved CBC mode. Search on Bibsonomy J. King Saud Univ. Comput. Inf. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Aleksejus Mihalkovich, Matas Levinskas, Lina Dindiene, Eligijus Sakalauskas CBC Mode of MPF Based Shannon Cipher Defined Over a Non-Commuting Platform Group. Search on Bibsonomy Informatica The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Abdessalem Abidi, Samar Tawbi, Christophe Guyeux, Belgacem Bouallegue, Mohsen Machhout Summary of Topological Study of Chaotic CBC Mode of Operation. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
27Abdessalem Abidi, Christophe Guyeux, Jacques Demerjian, Belagacem Bouallegue, Mohsen Machhout Lyapunov Exponent Evaluation of the CBC Mode of Operation. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
27Abdessalem Abidi, Christophe Guyeux, Belgacem Bouallegue, Mohsen Machhout Conditions to Have a Well-Disordered Dynamics in the CBC Mode of Operation. Search on Bibsonomy AICCSA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux Proving Chaotic Behavior of CBC Mode of Operation. Search on Bibsonomy Int. J. Bifurc. Chaos The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Takashi Kurokawa 0001, Ryo Nojima, Shiho Moriai On the security of CBC Mode in SSL3.0 and TLS1.0. Search on Bibsonomy J. Internet Serv. Inf. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux Quantitative Evaluation of Chaotic CBC Mode of Operation. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
27Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux Proving chaotic behaviour of CBC mode of operation. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
27Abdessalem Abidi, Christophe Guyeux, Bechara al Bouna, Belgacem Bouallegue, Mohsen Machhout The dynamics of the CBC Mode of Operation. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
27Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
27Abdessalem Abidi, Qianxue Wang, Belgacem Bouallegue, Mohsen Machhout, Christophe Guyeux Quantitative evaluation of chaotic CBC mode of operation. Search on Bibsonomy ATSIP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Abdessalem Abidi, Samar Tawbi, Christophe Guyeux, Belgacem Bouallegue, Mohsen Machhout Summary of Topological Study of Chaotic CBC Mode of Operation. Search on Bibsonomy CSE/EUC/DCABES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Rei Ueno, Sumio Morioka, Naofumi Homma, Takafumi Aoki A High Throughput/Gate AES Hardware Architecture by Compressing Encryption and Decryption Datapaths - Toward Efficient CBC-Mode Implementation. Search on Bibsonomy CHES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Takashi Kurokawa 0001, Ryo Nojima, Shiho Moriai Can We Securely Use CBC Mode in TLS1.0? Search on Bibsonomy ICT-EurAsia/CONFENIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Vlastimil Klíma, Tomás Rosa Strengthened Encryption in the CBC Mode. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2002 DBLP  BibTeX  RDF
27Roy Pereira, Rob Adams The ESP CBC-Mode Cipher Algorithms. Search on Bibsonomy RFC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
27Devesh C. Jinwala, Dhiren R. Patel, Kankar S. Dasgupta Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks. Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Authentication, Encryption, Block Ciphers, Link Layer Security
27Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson ManTiCore: Encryption with Joint Cipher-State Authentication. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Encryption Mode, Inexpensive Authentication, Luby-Rackoff, Feistel, Middletext, Hash, Cipher
23Jonathan Katz, Moti Yung Unforgeable Encryption and Chosen Ciphertext Secure Modes of Operation. Search on Bibsonomy FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Moses D. Liskov, Ronald L. Rivest, David A. Wagner 0001 Tweakable Block Ciphers. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF tweakable block ciphers, initialization vector, block ciphers, modes of operation
20Ray Bird, Inder S. Gopal, Amir Herzberg, Philippe A. Janson, Shay Kutten, Refik Molva, Moti Yung Systematic Design of Two-Party Authentication Protocols. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
16Martin R. Albrecht, Kenneth G. Paterson, Gaven J. Watson Plaintext Recovery Attacks against SSH. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16ZhenYu Hu, Dongdai Lin, Wenling Wu, Dengguo Feng Constructing parallel long-message signcryption scheme from trapdoor permutation. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel, signcryption, authenticated encryption, trapdoor permutations
16Bin B. Zhu, Shipeng Li 0001, Yang Yang JPEG 2000 encryption enabling fine granularity scalability without decryption. Search on Bibsonomy ISCAS (6) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Phillip Rogaway Nonce-Based Symmetric Encryption. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Initialization vector, provable security, modes of operation, symmetric encryption, nonces
16Stefan Mangard, Manfred Josef Aigner, Sandra Dominikus A Highly Regular and Scalable AES Hardware Architecture. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2003 DBLP  DOI  BibTeX  RDF IP module, scalability, VLSI, Advanced Encryption Standard (AES), regularity, hardware architecture
16Brice Canvel, Alain P. Hiltgen, Serge Vaudenay, Martin Vuagnoux Password Interception in a SSL/TLS Channel. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Serge Vaudenay Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS .... Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Hugo Krawczyk The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?). Search on Bibsonomy CRYPTO The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl C. Posch, Reinhard Posch, Johannes Wolkerstorfer A 155 Mbps Triple-DES Network Encryptor. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF DES algorithm, cipher block chaining, true single-phase logic, full-custom design, Network security, pipelining, encryption, Triple-DES
16Davor Runje, Mario Kovac Universal Strong Encryption FPGA Core Implementation. Search on Bibsonomy DATE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Chip Architecture, FPGA, Encryption, IDEA
16Mitsuru Matsui New Block Encryption Algorithm MISTY. Search on Bibsonomy FSE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Ivan Damgård, Lars R. Knudsen The Breaking of the AR Hash Function. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #53 of 53 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license