Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
88 | Phillip Rogaway |
Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
53 | David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu |
On Tweaking Luby-Rackoff Blockciphers. |
ASIACRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Lars Karlsson |
Planning, Truth Criteria and the Systematic Approach to Action and Change. |
ISMIS |
1996 |
DBLP DOI BibTeX RDF |
|
52 | Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas-López, Mridul Nandi, Yu Sasaki |
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. |
INDOCRYPT |
2021 |
DBLP DOI BibTeX RDF |
|
52 | Chun Guo 0002, Jian Guo 0001, Eik List, Ling Song 0001 |
Towards Closing the Security Gap of Tweak-aNd-Tweak (TNT). |
ASIACRYPT (1) |
2020 |
DBLP DOI BibTeX RDF |
|
52 | Avik Chakraborti, Nilanjan Datta, Ashwin Jha, Cuauhtemoc Mancillas López, Mridul Nandi, Yu Sasaki |
Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
36 | Kan Yasuda |
A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
birthday barrier, tweak, quasi-random function, message authentication code, mode of operation, checksum, pseudo-random function, compression function, domain extension |
35 | Moses D. Liskov, Ronald L. Rivest, David A. Wagner 0001 |
Tweakable Block Ciphers. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
tweakable block ciphers, initialization vector, block ciphers, modes of operation |
26 | Wonseok Choi 0002, Jooyoung Lee 0001, Yeongmin Lee |
Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds. |
IACR Trans. Symmetric Cryptol. |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Yunxue Lin, Ling Sun |
Related-Tweak and Related-Key Differential Attacks on HALFLOOP-48. |
ACNS (3) |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Zhenzhen Guo, Gaoli Wang, Orr Dunkelman, Yinxue Pan, Shengyuan Liu |
Tweakable SM4: How to tweak SM4 into tweakable block ciphers? |
J. Inf. Secur. Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Zhongliang Zhang, Zhen Qin, Chun Guo 0002 |
Just tweak! Asymptotically optimal security for the cascaded LRW1 tweakable blockcipher. |
Des. Codes Cryptogr. |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Yaobin Shen, François-Xavier Standaert |
Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
26 | Yaobin Shen, François-Xavier Standaert |
Optimally Secure Tweakable Block Ciphers with a Large Tweak from n-bit Block Ciphers. |
IACR Trans. Symmetric Cryptol. |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Benoît Cogliati, Jordan Ethan, Ashwin Jha, Soumya Kanti Saha |
On Large Tweaks in Tweakable Even-Mansour with Linear Tweak and Key Mixing. |
IACR Trans. Symmetric Cryptol. |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Jisu Ryou, Kihun Lee, Joongseek Lee |
"You said da da...": A Short Echoing Tweak for Journaling with VA. |
CHI Extended Abstracts |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Jared Gaskin, Bechir Hamdaoui, Weng-Keen Wong |
Tweak: Towards Portable Deep Learning Models for Domain-Agnostic LoRa Device Authentication. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Benoît Cogliati, Jérémy Jean, Thomas Peyrin, Yannick Seurin |
A Long Tweak Goes a Long Way: High Multi-user Security Authenticated Encryption from Tweakable Block Ciphers. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
26 | Wonseok Choi 0002, Jooyoung Lee 0001, Yeongmin Lee |
Building PRFs from TPRPs: Beyond the Block and the Tweak Length Bounds. |
IACR Cryptol. ePrint Arch. |
2022 |
DBLP BibTeX RDF |
|
26 | Gregor Leander, Shahram Rasoolzadeh |
Weak Tweak-Keys for the CRAFT Block Cipher. |
IACR Trans. Symmetric Cryptol. |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Jared Gaskin, Bechir Hamdaoui, Weng-Keen Wong |
Tweak: Towards Portable Deep Learning Models for Domain-Agnostic LoRa Device Authentication. |
CNS |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Anu Dhankhar, Sapna Juneja, Abhinav Juneja, Vikram Bali |
Kernel Parameter Tuning to Tweak the Performance of Classifiers for Identification of Heart Diseases. |
Int. J. E Health Medical Commun. |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang 0001, Siu-Ming Yiu |
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. |
IACR Cryptol. ePrint Arch. |
2021 |
DBLP BibTeX RDF |
|
26 | Jörg Keller 0001 |
How to Tweak a Cryptographic Permutation by Direct Manipulation. |
EICC |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Chao Niu, Muzhou Li, Meiqin Wang, Qingju Wang 0001, Siu-Ming Yiu |
Related-Tweak Impossible Differential Cryptanalysis of Reduced-Round TweAES. |
SAC |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Jeroen Delvaux |
On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
26 | Hao Guo, Siwei Sun, Danping Shi, Ling Sun 0001, Yao Sun, Lei Hu, Meiqin Wang |
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
26 | Hao Guo, Siwei Sun, Danping Shi, Ling Sun 0001, Yao Sun, Lei Hu, Meiqin Wang |
Differential Attacks on CRAFT Exploiting the Involutory S-boxes and Tweak Additions. |
IACR Trans. Symmetric Cryptol. |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Zhenzhen Bao, Chun Guo 0002, Jian Guo 0001, Ling Song 0001 |
TNT: How to Tweak a Block Cipher. |
EUROCRYPT (2) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Jeroen Delvaux |
On The Deployment of Tweak-in-Plaintext Protection Against Differential Fault Analysis. |
AsianHOST |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Rui Zong, Xiaoyang Dong |
MILP-Aided Related-Tweak/Key Impossible Differential Attack and its Applications to QARMA, Joltik-BC. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Muzhou Li, Kai Hu 0001, Meiqin Wang |
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
26 | Jacob Appelbaum, Chloe Martindale, Peter Wu |
Tiny WireGuard Tweak. |
IACR Cryptol. ePrint Arch. |
2019 |
DBLP BibTeX RDF |
|
26 | Muzhou Li, Kai Hu 0001, Meiqin Wang |
Related-Tweak Statistical Saturation Cryptanalysis and Its Application on QARMA. |
IACR Trans. Symmetric Cryptol. |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Jacob Appelbaum, Chloe Martindale, Peter Wu |
Tiny WireGuard Tweak. |
AFRICACRYPT |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Rui Zong, Xiaoyang Dong, Xiaoyun Wang 0001 |
MILP-Aided Related-Tweak/Key Impossible Differential Attack and Its applications to QARMA, Joltik-BC. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
26 | Maria Eichlseder, Daniel Kales |
Clustering Related-Tweak Characteristics: Application to MANTIS-6. |
IACR Trans. Symmetric Cryptol. |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Athmane Seghier |
Progressive Two-bits Tweak for Linear Redundancy reduction from Finite Field S-Boxes. |
ICCNS |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Aruna Gawade, Narendra Shekokar |
Lightweight Cipher Using GRP Bit Permutation and Tweak. |
ISDA (1) |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Maria Eichlseder, Daniel Kales |
Clustering Related-Tweak Characteristics: Application to MANTIS-6. |
IACR Cryptol. ePrint Arch. |
2017 |
DBLP BibTeX RDF |
|
26 | Krzysztof Hajto, Konrad Kamieniecki, Krzysztof Misztal, Przemyslaw Spurek |
Split-and-merge Tweak in Cross Entropy Clustering. |
CISIM |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Shoichi Hirose, Atsushi Yabumoto |
A Tweak for a PRF Mode of a Compression Function and Its Applications. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
26 | Raphael Bost, Olivier Sanders |
Trick or Tweak: On the (In)security of OTR's Tweaks. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
26 | Shoichi Hirose, Atsushi Yabumoto |
A Tweak for a PRF Mode of a Compression Function and Its Applications. |
SECITC |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Raphael Bost, Olivier Sanders |
Trick or Tweak: On the (In)security of OTR's Tweaks. |
ASIACRYPT (1) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Thomas Peyrin, Yannick Seurin |
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers. |
CRYPTO (1) |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Hayato Kobayashi, Kazuhiko Minematsu, Tetsu Iwata |
Optimality of Tweak Functions in CLOC. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Benoit Cogliati, Yannick Seurin |
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
26 | Kazuhiko Minematsu, Tetsu Iwata |
Tweak-Length Extension for Tweakable Blockciphers. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
26 | Thomas Peyrin, Yannick Seurin |
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers. |
IACR Cryptol. ePrint Arch. |
2015 |
DBLP BibTeX RDF |
|
26 | Benoît Cogliati, Yannick Seurin |
Beyond-Birthday-Bound Security for Tweakable Even-Mansour Ciphers with Linear Tweak and Key Mixing. |
ASIACRYPT (2) |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Kazuhiko Minematsu, Tetsu Iwata |
Tweak-Length Extension for Tweakable Blockciphers. |
IMACC |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Alexandra Jimborean, Konstantinos Koukos, Vasileios Spiliopoulos, David Black-Schaffer, Stefanos Kaxiras |
Fix the code. Don't tweak the hardware: A new compiler approach to Voltage-Frequency scaling. |
CGO |
2014 |
DBLP BibTeX RDF |
|
26 | Stevan Harnad |
United Kingdom's Open Access Policy Urgently Needs a Tweak. |
D Lib Mag. |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Kate Starbird, Jeannie A. Stamberger |
Tweak the tweet: Leveraging microblogging proliferation with a prescriptive syntax to support citizen reporting. |
ISCRAM |
2010 |
DBLP BibTeX RDF |
|
26 | Scott Petill |
Tweak. |
SIGGRAPH Abstracts and Applications |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Tad Hurst |
Flexible 3D searching: The directed tweak technique. |
J. Chem. Inf. Comput. Sci. |
1994 |
DBLP DOI BibTeX RDF |
|
18 | Shuyi Chen, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, William H. Sanders |
Blackbox prediction of the impact of DVFS on end-to-end performance of multitier systems. |
SIGMETRICS Perform. Evaluation Rev. |
2010 |
DBLP DOI BibTeX RDF |
|
18 | Stefano Di Carlo, Ernesto Sánchez 0001, Alberto Scionti, Giovanni Squillero, Alberto Paolo Tonda, Matteo Falasconi |
Towards drift correction in chemical sensors using an evolutionary strategy. |
GECCO |
2010 |
DBLP DOI BibTeX RDF |
artificial olfaction, drift correction, evolutionary strategies |
18 | Itai Dinur, Adi Shamir |
Cube Attacks on Tweakable Black Box Polynomials. |
EUROCRYPT |
2009 |
DBLP DOI BibTeX RDF |
cube attacks, tweakable black box polynomials, Cryptanalysis, stream ciphers, algebraic attacks, Trivium |
18 | Aileen Zhang, Chu-Wee Lim, Khoongming Khoo, Lei Wei 0001, Josef Pieprzyk |
Extensions of the Cube Attack Based on Low Degree Annihilators. |
CANS |
2009 |
DBLP DOI BibTeX RDF |
Cube Attack, Low-Degree Annihilators, Algebraic Attack |
18 | Daniele Quercia, Stephen Hailes, Licia Capra |
MobiRate: making mobile raters stick to their word. |
UbiComp |
2008 |
DBLP DOI BibTeX RDF |
distributed reputation (trust) systems, mobile systems |
18 | Jens Lincke, Robert Hirschfeld, Michael Rüger, Maic Masuch |
SophieScript - Active Content in Multimedia Documents. |
C5 |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Csaba A. Boer, Yvo A. Saanen |
Controls: Emulation to improve the performance of container terminals. |
WSC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Debrup Chakraborty, Mridul Nandi |
An Improved Security Bound for HCTR. |
FSE |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Monika Andersson, Maria Nordmark |
Bringing the web to the shop floor. |
NordiCHI |
2008 |
DBLP DOI BibTeX RDF |
interaction, user experience, retail, contextual design |
18 | Tushar Kumar, Romain Cledat, Jaswanth Sreeram, Santosh Pande |
Statistically Analyzing Execution Variance for Soft Real-Time Applications. |
LCPC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Rebecca Wirfs-Brock |
Giving Design Advice. |
IEEE Softw. |
2007 |
DBLP DOI BibTeX RDF |
Cognitive biases |
18 | Rosen Diankov, James Kuffner |
Randomized statistical path planning. |
IROS |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Joo Yeon Cho, Josef Pieprzyk |
Multiple Modular Additions and Crossword Puzzle Attack on NLSv2. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Crossword Puzzle Attack, NLSv2, Stream Ciphers, Distinguishing Attacks, eSTREAM, NLS |
18 | Raphael C.-W. Phan, Bok-Min Goi |
On the Analysis and Design of a Family Tree of Smart Card Based User Authentication Schemes. |
UIC |
2007 |
DBLP DOI BibTeX RDF |
|
18 | Laurel M. Sheppard |
Visual Effects and Video Analysis Lead to Olympics Victories. |
IEEE Computer Graphics and Applications |
2006 |
DBLP DOI BibTeX RDF |
biomechanics, Olympics |
18 | Scott Kircher, Michael Garland |
Editing arbitrarily deforming surface animations. |
ACM Trans. Graph. |
2006 |
DBLP DOI BibTeX RDF |
adaptive wavelets, deforming surface editing, mesh signal processing, pyramid schemes, multiresolution editing |
18 | Kazuhiko Minematsu |
Improved Security Analysis of XEX and LRW Modes. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Koji Yokokawa |
Script Synthesis Tool for Non-Experienced Programmers. |
C5 |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Jan-Phillip Tiesel, Jörn Loviscach |
A Mobile Low-Cost Motion Capture System Based on Accelerometers. |
ISVC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
18 | Andy C. Bavier, Nick Feamster, Mark Huang, Larry L. Peterson, Jennifer Rexford |
In VINI veritas: realistic and controlled network experimentation. |
SIGCOMM |
2006 |
DBLP DOI BibTeX RDF |
internet, routing, architecture, virtualization, experimentation |
18 | Alexander S. Klyubin, Daniel Polani, Chrystopher L. Nehaniv |
All Else Being Equal Be Empowered. |
ECAL |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Peng Wang 0009, Dengguo Feng, Wenling Wu |
HCTR: A Variable-Input-Length Enciphering Mode. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
disk sector encryption, modes of operation, symmetric encryption, Blockcipher, tweakable blockcipher |
18 | Maic Masuch, Michael Rüger |
Challenges in Collaborative Game Design Developing Learning Environments for Creating Games. |
C5 |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Alexander S. Klyubin, Daniel Polani, Chrystopher L. Nehaniv |
Empowerment: a universal agent-centric measure of control. |
Congress on Evolutionary Computation |
2005 |
DBLP DOI BibTeX RDF |
|
18 | Ron Wilson, Joe Gianelli, Chris Hamlin, Ken McElvain, Steve Leibson, Ivo Bolson, Rich Tobias, Raul Camposano |
Structured/platform ASIC apprentices: which platform will survive your board room? |
DAC |
2005 |
DBLP DOI BibTeX RDF |
programmable ASIC platforms, digital design |
18 | Bowen Hui, Sotirios Liaskos, John Mylopoulos |
Requirements Analysis for Customizable Software Goals-Skills-Preferences Framework. |
RE |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Richard Rasala |
Embryonic object versus mature object: object-oriented style and pedagogical theme. |
ITiCSE |
2003 |
DBLP DOI BibTeX RDF |
eXtreme encapsulation, mature object |
18 | Serge Vaudenay |
The Security of DSA and ECDSA. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Joanne Fuller, William Millan |
Linear Redundancy in S-Boxes. |
FSE |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Fadi A. Aloul, Igor L. Markov, Karem A. Sakallah |
FORCE: a fast and easy-to-implement variable-ordering heuristic. |
ACM Great Lakes Symposium on VLSI |
2003 |
DBLP DOI BibTeX RDF |
partitioning, placement, SAT, BDDs, hypergraph, CNF, pre-processing, backtrack search, variable order |
18 | Richard L. Baskerville, Linda Levine, Jan Pries-Heje, Balasubramaniam Ramesh, Sandra Slaughter |
How Internet Software Companies Negotiate Quality. |
Computer |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Diana Patterson |
The myth and realities of C.A.S.E. for documentation. |
SIGDOC |
1989 |
DBLP DOI BibTeX RDF |
|