|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 885 occurrences of 595 keywords
|
|
|
Results
Found 1422 publication records. Showing 1422 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
127 | Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin Lee 0002, Seokhie Hong, Jaesang Lee 0002, Dukjae Moon, Sungtaek Chee |
A New Dedicated 256-Bit Hash Function: FORK-256. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
256-bit Hash Function, FORK-256 |
121 | Pinakpani Pal, Palash Sarkar 0001 |
PARSHA-256- - A New Parallelizable Hash Function and a Multithreaded Implementation. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
parallel algorithm, hash function, binary tree, SHA-256 |
88 | Samuel Galice, Marine Minier |
Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
integral attacks, Rijndael-256, cryptanalysis, block cipher |
81 | Florian Mendel, Joseph Lano, Bart Preneel |
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
73 | Gautham Sekar, Bart Preneel |
Improved Distinguishing Attacks on HC-256. |
IWSEC |
2009 |
DBLP DOI BibTeX RDF |
|
72 | Hirotaka Yoshida, Alex Biryukov |
Analysis of a SHA-256 Variant. |
Selected Areas in Cryptography |
2005 |
DBLP DOI BibTeX RDF |
SHA-2-XOR, SHACAL-2-XOR, Pseudo-collision resistance, Iterative patterns, Differential cryptanalysis, SHA-256 |
65 | Ivica Nikolic, Alex Biryukov |
Collisions for Step-Reduced SHA-256. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Hongbo Yu, Xiaoyun Wang 0001 |
Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
MAC, distinguishing attack, SHA-256 |
63 | Krystian Matusiewicz, Thomas Peyrin, Olivier Billet, Scott Contini, Josef Pieprzyk |
Cryptanalysis of FORK-256. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
FORK-256, micro-collisions, cryptanalysis, hash functions |
63 | Markku-Juhani Olavi Saarinen |
A Meet-in-the-Middle Collision Attack Against the New FORK-256. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
FORK-256, Hash Function Cryptanalysis, Meet-in-the-middle Attack |
57 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Non-linear Reduced Round Attacks against SHA-2 Hash Family. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Alex Biryukov, Dmitry Khovratovich, Ivica Nikolic |
Distinguisher and Related-Key Attack on the Full AES-256. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
chosen key distinguisher, Davies-Meyer, ideal cipher, AES, related-key attack |
57 | Jongsung Kim, Seokhie Hong, Bart Preneel |
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256. |
FSE |
2007 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Block Ciphers, AES, Related-Key Rectangle Attack |
57 | Florian Mendel, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Analysis of Step-Reduced SHA-256. |
FSE |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Hongjun Wu |
A New Stream Cipher HC-256. |
FSE |
2004 |
DBLP DOI BibTeX RDF |
|
55 | Marko Hölbl, Christian Rechberger, Tatjana Welzer |
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
differential collision search, hash function, conditions, SHA-256 |
49 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
New Collision Attacks against Up to 24-Step SHA-2. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
SHA-2 hash family, reduced round attacks, Cryptanalysis |
49 | Swatee Singh, Georgia D. Tourassi, Joseph Y. Lo |
Effect of Similarity Metrics and ROI Sizes in Featureless Computer Aided Detection of Breast Masses in Tomosynthesis. |
Digital Mammography / IWDM |
2008 |
DBLP DOI BibTeX RDF |
3D CAD, mammography, x-ray, Computer Aided Detection, Tomosynthesis |
48 | Yongzhuang Wei, YuPu Hu |
New related-key rectangle attacks on reduced AES-192 and AES-256. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
block cipher, Advanced Encryption Standard, time complexity, related-key rectangle attack |
48 | Ewan Fleischmann, Michael Gorski, Stefan Lucks |
Attacking 9 and 10 Rounds of AES-256. |
ACISP |
2009 |
DBLP DOI BibTeX RDF |
related-key boomerang attack, block ciphers, AES, differential cryptanalysis |
48 | Somitra Kumar Sanadhya, Palash Sarkar 0001 |
Attacking Reduced Round SHA-256. |
ACNS |
2008 |
DBLP DOI BibTeX RDF |
|
41 | Florian Mendel, Martin Schläffer |
Collisions for Round-Reduced LAKE. |
ACISP |
2008 |
DBLP DOI BibTeX RDF |
cryptanalysis, hash functions, collision attack |
40 | Matthew Henricksen, Ed Dawson |
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
Intel Pentium 4, Dragon, HC-256, MAG, Mir-1, Py, Implementation, Stream cipher, RC4 |
40 | Sebastiaan Indesteege, Florian Mendel, Bart Preneel, Martin Schläffer |
Practical Collisions for SHAMATA-256. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
SHAMATA, hash function, collision attack, SHA-3 candidate |
40 | Bonwook Koo, Hwan Seok Jang, Jung Hwan Song |
On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher. |
ICISC |
2006 |
DBLP DOI BibTeX RDF |
diffusion layer, SPN, Block cipher, binary matrix |
40 | Chih-Peng Fan, Mau-Shih Lee, Guo-An Su |
A Low Multiplier and Multiplication Costs 256-point FFT Implementation with Simplified Radix-24 SDF Architecture. |
APCCAS |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Kurt K. Ting, Steve C. L. Yuen, Kin-Hong Lee, Philip Heng Wai Leong |
An FPGA Based SHA-256 Processor. |
FPL |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Kazumaro Aoki, Jian Guo 0001, Krystian Matusiewicz, Yu Sasaki, Lei Wang 0031 |
Preimages for Step-Reduced SHA-2. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash, preimage attack, meet-in-the-middle, SHA-256 |
39 | Takanori Isobe 0001, Kyoji Shibutani |
Preimage Attacks on Reduced Tiger and SHA-2. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
SHA-512, hash function, preimage attack, second preimage attack, meet-in-the-middle, SHA-256, Tiger |
39 | Fei Wu 0005, Liang Wang, Jiguang Wan |
A Low Cost and Inner-round Pipelined Design of ECB-AES-256 Crypto Engine for Solid State Disk. |
NAS |
2010 |
DBLP DOI BibTeX RDF |
inner-round, ECB-AES-256 crypto engine, SSD |
39 | Yong Ki Lee, Herwin Chan, Ingrid Verbauwhede |
Iteration Bound Analysis and Throughput Optimum Architecture of SHA-256 (384, 512) for Hardware Implementations. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
SHA-256 (384,512), Iteration Bound Analysis, Throughput Optimum Architecture |
33 | Tsung-Han Tsai 0001, Yu-Nan Pan |
High Efficiency Architecture of Fast Block Motion Estimation with Real-Time QFHD on H.264 Video Coding. |
ISM |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Akashi Satoh |
ASIC hardware implementations for 512-bit hash function Whirlpool. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Kitae Jeong, Joongeun Choi, Yuseop Lee, Changhoon Lee, Jaechul Sung, Haeryong Park, Yeonjung Kang |
Update on SEED: SEED-192/256. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Block Ciphers, SEED |
32 | Mooseop Kim, Jaecheol Ryou 0001, Sungik Jun |
Efficient Hardware Architecture of SHA-256 Algorithm for Trusted Mobile Computing. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Joon Woo Shin, Hyeong Jun Park, Dae Soon Cho, Chang Wan Yoo, Yoon Ok Park, Deuk Soo Lyu |
The Implementation of 256 QAM CDMA Modulator. |
HSNMC |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Peter-Michael Seidel, Lee D. McFearin, David W. Matula |
Binary Multiplication Radix-32 and Radix-256. |
IEEE Symposium on Computer Arithmetic |
2001 |
DBLP DOI BibTeX RDF |
|
32 | Khadijeh Karamzadeh, Masood Teymouri, Massoud Dousti, Pooya Torkzadeh |
A 256 × 256 CMOS image sensor with differential readout and data converter circuits. |
Int. J. Circuit Theory Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Jier Wang, Jie Li, Yifan Wu, Hengwei Yu, Lebei Cui, Miao Sun, Patrick Yin Chiang |
A 256 × 256 LiDAR Imaging System Based on a 200 mW SPAD-Based SoC with Microlens Array and Lightweight RGB-Guided Depth Completion Neural Network. |
Sensors |
2023 |
DBLP DOI BibTeX RDF |
|
32 | Hachem Bensalem, Yves Blaquière, Yvon Savaria |
Acceleration of the Secure Hash Algorithm-256 (SHA-256) on an FPGA-CPU Cluster Using OpenCL. |
ISCAS |
2021 |
DBLP DOI BibTeX RDF |
|
32 | Pekka Keränen, Juha Kostamovaara |
256 × 8 SPAD Array With 256 Column TDCs for a Line Profiling Laser Radar. |
IEEE Trans. Circuits Syst. I Regul. Pap. |
2019 |
DBLP DOI BibTeX RDF |
|
32 | You-Na Lee 0001, Yasuyuki Kimura, Yusuke Nakamura, Toshihiko Noda, Kazuhiro Takahashi, Kazuaki Sawada |
Insertable 256×256 ion image sensor for spatiotemporal pH recording. |
BioCAS |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Robert K. Henderson, Nick Johnston, Sam W. Hutchings, István Gyöngy, Tarek Al Abbas, Neale A. W. Dutton, Max Tyler, Susan Chan, Jonathan Leach |
A 256×256 40nm/90nm CMOS 3D-Stacked 120dB Dynamic-Range Reconfigurable Time-Resolved SPAD Imager. |
ISSCC |
2019 |
DBLP DOI BibTeX RDF |
|
32 | Li Lin 0003, Wenling Wu |
Improved meet-in-the-middle attacks on reduced-round Kalyna-128/256 and Kalyna-256/512. |
Des. Codes Cryptogr. |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Ben Lapid, Avishai Wool |
Cache-Attacks on the ARM TrustZone implementations of AES-256 and AES-256-GCM via GPU-based analysis. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
32 | Ben Lapid, Avishai Wool |
Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis. |
SAC |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Augusto Ronchini Ximenes, Preethi Padmanabhan, Myung-Jae Lee, Yuichiro Yamashita, Dun-Nian Yaung, Edoardo Charbon |
A 256×256 45/65nm 3D-stacked SPAD-based direct TOF image sensor for LiDAR applications with optical polar modulation for up to 18.6dB interference suppression. |
ISSCC |
2018 |
DBLP DOI BibTeX RDF |
|
32 | Zhe Chen, Shan Di, Zhongxiang Cao, Qi Qin, Fei Ji, Liyuan Liu, Nanjian Wu |
A 256×256 time-of-flight image sensor based on center-tap demodulation pixel structure. |
Sci. China Inf. Sci. |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Hongbo Yu, Yonglin Hao, Dongxia Bai |
Evaluate the security margins of SHA-512, SHA-256 and DHA-256 against the boomerang attack. |
Sci. China Inf. Sci. |
2016 |
DBLP DOI BibTeX RDF |
|
32 | Li Lin 0003, Wenling Wu |
Improved Meet-in-the-Middle Attacks on Reduced-Round Kalyna-128/256 and Kalyna-256/512. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
32 | Tony Hansen |
SCRAM-SHA-256 and SCRAM-SHA-256-PLUS Simple Authentication and Security Layer (SASL) Mechanisms. |
RFC |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya |
Single Key Recovery Attacks on 9-round Kalyna-128/256 and Kalyna-256/512. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
32 | Akshima, Donghoon Chang, Mohona Ghosh, Aarushi Goel, Somitra Kumar Sanadhya |
Single Key Recovery Attacks on 9-Round Kalyna-128/256 and Kalyna-256/512. |
ICISC |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Fatma Kahri, Hassen Mestiri, Belgacem Bouallegue, Mohsen Machhout |
Efficient FPGA hardware implementation of secure hash function SHA-256/Blake-256. |
SSD |
2015 |
DBLP DOI BibTeX RDF |
|
32 | Jinkeon Kang, Kitae Jeong, Jaechul Sung, Seokhie Hong, Kyungho Lee |
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. |
J. Appl. Math. |
2013 |
DBLP DOI BibTeX RDF |
|
32 | Ruoyu Xu, Bing Liu 0012, George Jie Yuan |
A 1500 fps Highly Sensitive 256 , ˟, 256 CMOS Imaging Sensor With In-Pixel Calibration. |
IEEE J. Solid State Circuits |
2012 |
DBLP DOI BibTeX RDF |
|
32 | Yusuke Oike, Abbas El Gamal |
A 256×256 CMOS image sensor with ΔΣ-based single-shot compressed sensing. |
ISSCC |
2012 |
DBLP DOI BibTeX RDF |
|
32 | Shingo Mandai, Makoto Ikeda, Kunihiro Asada |
A 256×256 14k range maps/s 3-D range-finding image sensor using row-parallel embedded binary. |
ISSCC |
2010 |
DBLP DOI BibTeX RDF |
|
32 | Vahid Majidzadeh, Laurent Jacques, Alexandre Schmid, Pierre Vandergheynst, Yusuf Leblebici |
A (256×256) pixel 76.7mW CMOS imager/ compressor based on real-time In-pixel compressive sensing. |
ISCAS |
2010 |
DBLP DOI BibTeX RDF |
|
32 | Yaser Esmaeili Salehani, Amir Tabatabaei, Mohammad Reza Sohizadeh Abyaneh, Mehdi M. Hassanzadeh |
NESHA-256, NEw 256-bit Secure Hash Algorithm (Extended Abstract). |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
32 | Ryan W. Robucci, Jordan D. Gray, David Abramson 0002, Paul E. Hasler |
A 256×256 separable transform CMOS imager. |
ISCAS |
2008 |
DBLP DOI BibTeX RDF |
|
32 | Seiichiro Mizuno, Kazuki Fujita, Hiroo Yamamoto, Naohisa Mukozaka, Haruyoshi Toyoda |
A 256×256 compact CMOS image sensor with on-chip motion detection function. |
IEEE J. Solid State Circuits |
2003 |
DBLP DOI BibTeX RDF |
|
32 | Yang Ni, Jianhong Guan |
A 256×256 pixel smart CMOS image sensor for line-based stereo vision applications. |
IEEE J. Solid State Circuits |
2000 |
DBLP DOI BibTeX RDF |
|
32 | Iliana L. Fujimori, Ching-Chun Wang, Charles G. Sodini |
A 256×256 CMOS differential passive pixel imager with FPN reduction techniques. |
IEEE J. Solid State Circuits |
2000 |
DBLP DOI BibTeX RDF |
|
32 | Steven Decker, R. Daniel McGrath, Kevin Brehmer, Charles G. Sodini |
A 256×256 CMOS imaging array with wide dynamic range pixels and column-parallel digital output. |
IEEE J. Solid State Circuits |
1998 |
DBLP DOI BibTeX RDF |
|
32 | R. H. Nixon, Sabrina E. Kemeny, Bedabrata Pain, Craig O. Staller, Eric R. Fossum |
256×256 CMOS active pixel sensor camera-on-a-chip. |
IEEE J. Solid State Circuits |
1996 |
DBLP DOI BibTeX RDF |
|
32 | David L. Perry, Eustace L. Dereniak |
Laboratory evaluation of the Hughes 256 x 256 hybrid PtSi imaging device. |
J. Electronic Imaging |
1993 |
DBLP DOI BibTeX RDF |
|
32 | Kyusun Choi, William S. Adams |
VLSI Implementation of a 256 x 256 Crossbar Interconnection Network. |
IPPS |
1992 |
DBLP DOI BibTeX RDF |
|
32 | Hiroshi Miyanaga, Hironori Yamauchi, Kazuhiro Matsuda |
A real-time 256×256 point two-dimensional FFT single-chip processor. |
ICASSP |
1991 |
DBLP DOI BibTeX RDF |
|
32 | J. L. Mitchell, Kenneth H. Olsen |
TX-0, a transistor computer with a 256 by 256 memory. |
AIEE-IRE Computer Conference (Eastern) |
1956 |
DBLP DOI BibTeX RDF |
|
31 | Ricardo Chaves, Georgi Kuzmanov, Leonel Sousa, Stamatis Vassiliadis |
Improving SHA-2 Hardware Implementations. |
CHES |
2006 |
DBLP DOI BibTeX RDF |
SHA-2 (256, 512), FPGA, Cryptography, Hash functions |
31 | Johnson Kin, Munish Gupta, William H. Mangione-Smith |
The Filter Cache: An Energy Efficient Memory Structure. |
MICRO |
1997 |
DBLP DOI BibTeX RDF |
direct mapped 256-byte filter cache, energy efficient memory structure, on-chip caches, static RAM, microprocessors, microprocessor chips, power reduction, embedded applications, L2 cache, filter cache, L1 cache |
24 | John Paul Walters, Rohan Darole, Vipin Chaudhary |
Improving MPI-HMMER's scalability with parallel I/O. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Chin-Teng Lin, Yuan-Chu Yu, Lan-Da Van |
Cost-Effective Triple-Mode Reconfigurable Pipeline FFT/IFFT/2-D DCT Processor. |
IEEE Trans. Very Large Scale Integr. Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Jie Chen 0055, YuPu Hu, Yueyu Zhang |
Impossible differential cryptanalysis of Advanced Encryption Standard. |
Sci. China Ser. F Inf. Sci. |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, block cipher, advanced encryption standard, impossible differential cryptanalysis |
24 | François Arnault, Thierry P. Berger, Cédric Lauradoux, Marine Minier |
X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
cryptanalysis, stream cipher, software design, FCSRs |
24 | Hirotaka Yoshida, Dai Watanabe, Katsuyuki Okeya, Jun Kitahara, Hongjun Wu 0001, Özgül Küçük, Bart Preneel |
MAME: A Compression Function with Reduced Hardware Requirements. |
CHES |
2007 |
DBLP DOI BibTeX RDF |
low-resource implementation, hash functions, compression functions |
24 | Alice N. Averbukh, David S. Channin, Michael J. Flynn |
Assessment of a Novel, High-Resolution, Color, AMLCD for Diagnostic Medical Image Display: Luminance Performance and DICOM Calibration. |
J. Digit. Imaging |
2003 |
DBLP DOI BibTeX RDF |
AMLCD evaluation, DICOM Part 14 calibration, PACS, image display |
24 | Domingo Benitez |
Performance of Remote FPGA-Based Coprocessors for Image-Processing Applications. |
DSD |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Bert den Boer, Kerstin Lemke, Guntram Wicke |
A DPA Attack against the Modular Reduction within a CRT Implementation of RSA. |
CHES |
2002 |
DBLP DOI BibTeX RDF |
RSA, DPA, power analysis, smartcard, CRT, side channel analysis, modular reduction |
24 | Chin-Chen Chang 0001, Yuan-Yuan Su |
A Dynamic Color Palette for Color Images Coding. |
IEEE Pacific Rim Conference on Multimedia |
2002 |
DBLP DOI BibTeX RDF |
Index color, CIQBM, LBG |
24 | Eun Seok Kim, Jay Jeong Kim |
An Automatic Modeling Method for Fitting Volumetric Objects with Metacubes. |
PG |
2000 |
DBLP DOI BibTeX RDF |
|
24 | Eli Biham, Vladimir Furman |
Improved Impossible Differentials on Twofish. |
INDOCRYPT |
2000 |
DBLP DOI BibTeX RDF |
Twofish, cryptanalysis, impossible differential |
24 | John Kelsey, Bruce Schneier |
Key-Schedule Cryptanalysis of DEAL. |
Selected Areas in Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Kum-Yew Lai, Thomas W. Malone |
Object lens: letting end-users create cooperative work applications. |
CHI |
1991 |
DBLP DOI BibTeX RDF |
|
24 | Kate Ehrlich |
Human interface at SUN (East). |
CHI |
1991 |
DBLP DOI BibTeX RDF |
Sun |
24 | Mark K. Singley |
MOLEHILL: an instructional system for Smalltalk programming. |
CHI |
1991 |
DBLP DOI BibTeX RDF |
Smalltalk |
24 | Brad T. Vander Zanden, Brad A. Myers |
The Lapidary graphical interface design tool. |
CHI |
1991 |
DBLP DOI BibTeX RDF |
|
24 | Jamie Schultz |
A graphical reflection notation used in an intelligent discovery world tutoring system. |
CHI |
1991 |
DBLP DOI BibTeX RDF |
|
24 | Lon Barfield, Eddy Boeve, Steven Pemberton |
The views user-interface system. |
CHI |
1991 |
DBLP DOI BibTeX RDF |
|
24 | Allen Cypher |
Video presentation Eager: programming repetitive tasks by example. |
CHI |
1991 |
DBLP DOI BibTeX RDF |
HyperCard |
24 | Neff Walker, John B. Smelcer |
A comparison of selection time from walking and pull-down menus. |
CHI |
1990 |
DBLP DOI BibTeX RDF |
|
24 | Terry Winograd |
What can we teach about human-computer interaction? (plenary address). |
CHI |
1990 |
DBLP DOI BibTeX RDF |
|
24 | Hans Brunner |
A snapshot of natural language interfaces (panel). |
CHI |
1990 |
DBLP DOI BibTeX RDF |
|
24 | Jakob Nielsen |
Designing for international use (panel). |
CHI |
1990 |
DBLP DOI BibTeX RDF |
|
24 | S. Joy Mountford |
Designers: meet your users (panel). |
CHI |
1990 |
DBLP DOI BibTeX RDF |
Apple Computer, HyperCard, Inc |
24 | Marcy Telles |
Updating an older interface. |
CHI |
1990 |
DBLP DOI BibTeX RDF |
WordStar |
24 | James A. Reeds, John L. Manferdelli |
DES Has No Per Round Linear Factors. |
CRYPTO |
1984 |
DBLP DOI BibTeX RDF |
|
24 | Alex Biryukov, Dmitry Khovratovich |
Related-Key Cryptanalysis of the Full AES-192 and AES-256. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
AES, related-key attack, boomerang attack |
24 | Paul Stankovski, Martin Hell, Thomas Johansson 0001 |
An Efficient State Recovery Attack on X-FCSR-256. |
FSE |
2009 |
DBLP DOI BibTeX RDF |
X-FCSR, state recovery, cryptanalysis, stream cipher, FCSR |
Displaying result #1 - #100 of 1422 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|