The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for NESSIE with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1997-2001 (16) 2002-2003 (21) 2004-2006 (15) 2007-2018 (15) 2022-2024 (2)
Publication types (Num. hits)
article(5) incollection(4) inproceedings(60)
Venues (Conferences, Journals, ...)
FSE(10) Public Key Cryptography(6) CT-RSA(5) ICISC(4) EUROCRYPT(3) ASIACRYPT(2) CRYPTO(2) FPL(2) ICICS(2) INDOCRYPT(2) ISC(2) Selected Areas in Cryptography(2) ACISP(1) Bioinform.(1) CANS(1) CHES(1) More (+10 of total 39)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 90 occurrences of 57 keywords

Results
Found 70 publication records. Showing 69 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
80Bart Preneel New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
80Bart Preneel NESSIE: A European Approach to Evaluate Cryptographic Algorithms. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
58Máire McLoone, John V. McCanny Very High Speed 17 Gbps SHACAL Encryption Architecture. Search on Bibsonomy FPL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF SHACAL, NESSIE
58Steve Babbage, Christophe De Cannière, Joseph Lano, Bart Preneel, Joos Vandewalle Cryptanalysis of SOBER-t32. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Sober-t32, Guess and Determine Attack, Cryptanalysis, Distinguishing Attack, Security Evaluation, NESSIE
58Nicolas T. Courtois, Willi Meier Algebraic Attacks on Stream Ciphers with Linear Feedback. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Algebraic attacks on stream ciphers, factoring multivariate polynomials, overdefined problems, ciphertext-only attacks, Toyocrypt, Cryptrec, LILI-128, Boolean functions, nonlinear filtering, pseudo-random generators, Nessie, XL algorithm, multivariate equations
51Owen Henkel, Hannah Horne-Robinson, Nessie Kozhakhmetova, Amanda Lee Effective and Scalable Math Support: Evidence on the Impact of an AI- Tutor on Math Achievement in Ghana. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
48Rainer Steinwandt, Willi Geiselmann, Thomas Beth A Theoretical DPA-Based Cryptanalysis of the NESSIE Candidates FLASH and SFLASH. Search on Bibsonomy ISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
48Henri Gilbert, Marine Minier Cryptanalysis of SFLASH. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF asymmetric signature, cryptanalysis, multivariate polynomials, SFLASH
42Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Takeshi Kawabata Higher Order Differential Attacks on Reduced-Round MISTY1. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CRYPTREC, higher order differential attack, MISTY1, block cipher, NESSIE
42Joo Yeon Cho, Josef Pieprzyk Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering. Search on Bibsonomy FSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF SOBER-t32, SOBER-t16, stream ciphers, linearization, Algebraic attack, NESSIE, modular addition, multivariate equations
42Nicolas T. Courtois, Magnus Daum, Patrick Felke On the Security of HFE, HFEv- and Quartz. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF asymmetric cryptography, multivariate cryptanalysis, Gröbner bases, Hidden Field Equation, HFE problem, Quartz, Nessie project, finite fields
42Nicolas T. Courtois Generic Attacks and the Security of Quartz. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Asymmetric cryptography, Hidden Field Equations (HFE), MQ, HFEv-, Quartz, finite fields, Flash, short signatures, Nessie, Sflash
42Nicolas T. Courtois Fast Algebraic Attacks on Stream Ciphers with Linear Feedback. Search on Bibsonomy CRYPTO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF combiners with memory, LFSR synthesis, Toyocrypt, Cryptrec, LILI-128, E0, Boolean functions, stream ciphers, Bluetooth, nonlinear filters, Algebraic attacks, Berlekamp-Massey algorithm, Nessie, multivariate equations
32Ellen Arteca, Sebastian Harner, Michael Pradel, Frank Tip Nessie: Automatically Testing JavaScript APIs with Asynchronous Callbacks. Search on Bibsonomy ICSE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
32Michele Berselli, Enrico Lavezzo, Stefano Toppo NeSSie: a tool for the identification of approximate DNA sequence symmetries. Search on Bibsonomy Bioinform. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
32Thomas Kemmer, Sergej Rjasanow, Andreas Hildebrandt 0001 NESSie.jl - Efficient and intuitive finite element and boundary element methods for nonlocal protein electrostatics in the Julia language. Search on Bibsonomy J. Comput. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
32Benjamin Cassell, Tyler Szepesi, Bernard Wong 0001, Tim Brecht, Jonathan Ma, Xiaoyi Liu Nessie: A Decoupled, Client-Driven Key-Value Store Using RDMA. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
32Bart Preneel NESSIE Project. Search on Bibsonomy Encyclopedia of Cryptography and Security (2nd Ed.) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
32Alan Taylor, Desmond J. Higham NESSIE: Network Example Source Supporting Innovative Experimentation. Search on Bibsonomy Network Science The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
32Michael D. Breitenstein, Helmut Grabner, Luc Van Gool Hunting Nessie - Real-time abnormality detection from webcams. Search on Bibsonomy ICCV Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
32Bart Preneel NESSIE Project. Search on Bibsonomy Encyclopedia of Cryptography and Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Wolfgang Prinz NESSIE: An awareness environment for cooperative settings. Search on Bibsonomy ECSCW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
32Jeffrey Galloway Nessie. Search on Bibsonomy SIGGRAPH Visual Proceedings The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
32Alexis Vander Biest, Alienor Richard, Dragomir Milojevic, Frédéric Robert A Multi-objective and Hierarchical Exploration Tool for SoC Performance Estimation. Search on Bibsonomy SAMOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern Cryptanalysis of the SFLASH Signature Scheme. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF signature, differential cryptanalysis, multivariate cryptography, SFLASH
32Jongsung Kim, Guil Kim, Sangjin Lee 0002, Jongin Lim 0001, Jung Hwan Song Related-Key Attacks on Reduced Rounds of SHACAL-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Kouichi Sakurai, Tsuyoshi Takagi A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF EPOC-2, reject function, Manger's attack, factoring, timing attack, chosen ciphertext attack
32Willi Geiselmann, Rainer Steinwandt, Thomas Beth Attacking the Affine Parts of SFLASH. Search on Bibsonomy IMACC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Eckhard Meier, Wolfgang Prinz, Wolfgang Broll Augmenting Cooperative Settings by Shared Awareness Spaces. Search on Bibsonomy WETICE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF groupware, Awareness, 3D environments
26Alex Biryukov, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle New Weak-Key Classes of IDEA. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF IDEA cipher, weak keys, NESSIE, boomerang attack
16Matthew Robshaw The eSTREAM Project. Search on Bibsonomy The eSTREAM Finalists The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Timo Alho, Panu Hämäläinen, Marko Hännikäinen, Timo D. Hämäläinen Compact hardware design of Whirlpool hashing core. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Vivien Dubois, Pierre-Alain Fouque, Jacques Stern Cryptanalysis of SFLASH with Slightly Modified Parameters. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Gaoli Wang Related-Key Rectangle Attack on 43-Round SHACAL-2. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SHACAL-2, Differential characteristic, Block cipher, Related-Key Rectangle attack
16Eli Biham, Orr Dunkelman, Nathan Keller A Simple Related-Key Attack on the Full SHACAL-1. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Vivien Dubois, Pierre-Alain Fouque, Adi Shamir, Jacques Stern Practical Cryptanalysis of SFLASH. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Orr Dunkelman, Nathan Keller, Jongsung Kim Related-Key Rectangle Attack on the Full SHACAL-1. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Norbert Pramstaller, Christian Rechberger, Vincent Rijmen A compact FPGA implementation of the hash function whirlpool. Search on Bibsonomy FPGA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF compact hardware implementation, FPGA, hash function, whirlpool
16Guan Jie, Zhang Zhongya Improved Collision Attack on Reduced Round Camellia. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Block cipher, Collision attack, Camellia
16Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Hiroyasu Kubo, Kazuhiko Minematsu Shorter bit sequence is enough to break stream cipher LILI-128. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Paris Kitsos, Michalis D. Galanis, Odysseas G. Koufopavlou A RAM-based FPGA implementation of the 64-bit MISTY1 block cipher. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Olivier Billet, Henri Gilbert Resistance of SNOW 2.0 Against Algebraic Attacks. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF SNOW 2.0, stream ciphers, algebraic attacks
16Wenling Wu, Dengguo Feng, Hua Chen 0011 Collision Attack and Pseudorandomness of Reduced-Round Camellia. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Block cipher, Time complexity, Pseudorandomness, Data complexity, Camellia
16Daniel Denning, James Irvine 0001, Malachy Devlin A Key Agile 17.4 Gbit/sec Camellia Implementation. Search on Bibsonomy FPL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16Nicolas T. Courtois Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
16YongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee 0002 Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Differential-Linear Type Attacks, SHACAL-2, Block Cipher
16Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. Search on Bibsonomy ITCC (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Asymmetric Signature, C *, C *-, Hidden Monomial Problem, Side Channel Attacks, SHA-1, SFLASH
16Bo-Yin Yang, Jiun-Ming Chen, Yen-Hung Chen TTS: High-Speed Signatures on a Low-Cost Smart Card. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF 8051, smart card, finite field, Multivariate public-key cryptosystem
16Gaël Rouvroy, François-Xavier Standaert, Jean-Jacques Quisquater, Jean-Didier Legat Efficient FPGA Implementation of Block Cipher MISTY1. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Frédéric Muller A New Attack against Khazad. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Mehdi-Laurent Akkar, Nicolas T. Courtois, Romain Duteuil, Louis Goubin A Fast and Secure Implementation of Sflash. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Matsumoto-Imai cryptosystem C*, C*- trapdoor function, Digital Signatures, Smart cards, DPA, PKI, Power Analysis, SPA, portable devices, Addition Chains, Multivariate Cryptography, HFE
16Eli Biham, Orr Dunkelman, Nathan Keller Rectangle Attacks on 49-Round SHACAL-1. Search on Bibsonomy FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Jiun-Ming Chen, Bo-Yin Yang A More Secure and Efficacious TTS Signature Scheme. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee 0002 Impossible Differential Attack on 30-Round SHACAL-2. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Jongsung Kim, Dukjae Moon, Wonil Lee, Seokhie Hong, Sangjin Lee 0002, Seok Won Jung Amplified Boomerang Attack against Reduced-Round SHACAL. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF SHACAL, Amplified boomerang attack, Boomerang-distinguisher
16Nicolas T. Courtois, Louis Goubin, Willi Meier, Jean-Daniel Tacier Solving Underdefined Systems of Multivariate Quadratic Equations. Search on Bibsonomy Public Key Cryptography The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Helger Lipmaa Fast Software Implementations of SC2000. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Block cipher design, large S-boxes, SC2000, fast implementation
16Markus Dichtl, Marcus Schafheutle Linearity Properties of the SOBER-t32 Key Loading. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Ulrich Kühn 0001 Improved Cryptanalysis of MISTY1. Search on Bibsonomy FSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Slicing Attack, Cryptanalysis, Block cipher, Impossible Differential
16Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Fast Correlation Attack Algorithm with List Decoding and an Application. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF nonlinear combiner, cryptanalysis, Stream ciphers, linear feedback shift registers, nonlinear filter, keystream generators
16Eli Biham, Vladimir Furman, Michal Misztal, Vincent Rijmen Differential Cryptanalysis of Q. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Paulo S. L. M. Barreto, Vincent Rijmen, Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle, Hae Yong Kim Improved SQUARE Attacks against Reduced-Round HIEROCRYPT. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Vladimir Furman Differential Cryptanalysis of Nimbus. Search on Bibsonomy FSE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Seonhee Lee, Seokhie Hong, Sangjin Lee 0002, Jongin Lim 0001, Seonhee Yoon Truncated Differential Cryptanalysis of Camellia. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Helena Handschuh, Lars R. Knudsen, Matthew J. B. Robshaw Analysis of SHA-1 in Encryption Mode. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Jacques Patarin, Nicolas T. Courtois, Louis Goubin FLASH, a Fast Multivariate Signature Algorithm. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Jacques Patarin, Nicolas T. Courtois, Louis Goubin QUARTZ, 128-Bit Long Digital Signatures. Search on Bibsonomy CT-RSA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Yeping He, Sihan Qing Square Attack on Reduced Camellia Cipher. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Vladimir V. Prokhorov, Vadim A. Kosarev Environment piJ for Visual Programming in Java. Search on Bibsonomy IV The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #69 of 69 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license