|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 27 occurrences of 25 keywords
|
|
|
Results
Found 37 publication records. Showing 37 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Frederik Armknecht, Stefan Lucks (eds.) |
Research in Cryptology - 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers |
WEWoRC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Erik Tews, Julian Wälde, Michael Weiner |
Breaking DVB-CSA. |
WEWoRC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Marián Kühnel |
RSA Vulnerabilities with Small Prime Difference. |
WEWoRC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Onur Koçak, Nese Öztop |
Cryptanalysis of TWIS Block Cipher. |
WEWoRC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michelle Kendall, Keith M. Martin |
On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks. |
WEWoRC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Robert Niebuhr, Pierre-Louis Cayrel |
Broadcast Attacks against Code-Based Schemes. |
WEWoRC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Xinxin Fan, Guang Gong |
On the Security of Hummingbird-2 against Side Channel Cube Attacks. |
WEWoRC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Timo Bartkewitz, Tim Güneysu |
Full Lattice Basis Reduction on Graphics Cards. |
WEWoRC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Aysajan Abidin, Jan-Åke Larsson |
New Universal Hash Functions. |
WEWoRC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Zoya Dyka, Peter Langendörfer, Frank Vater |
Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2 k ). |
WEWoRC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Ewan Fleischmann, Christian Forler, Stefan Lucks |
Γ-MAC[H, P] - A New Universal MAC Scheme. |
WEWoRC |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Lucks, Ahmad-Reza Sadeghi, Christopher Wolf (eds.) |
Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers |
WEWoRC |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Rei Yoshida, Rie Shigetomi, Kazuki Yoshizoe, Akira Otsuka, Hideki Imai |
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
Context-dependent Service, Randomized Response Technique, Privacy Protection |
1 | Michael Beiter |
Combiner Driven Management Models and Their Applications. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
multi-time secret sharing, threshold schemes with update capabilities, secret sharing, management models |
1 | Sebastiaan Indesteege, Bart Preneel |
Preimages for Reduced-Round Tiger. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
hash functions, preimages, Tiger |
1 | Marko Hölbl, Christian Rechberger, Tatjana Welzer |
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
differential collision search, hash function, conditions, SHA-256 |
1 | Tim Güneysu, Christof Paar, Sven Schäge |
Efficient Hash Collision Search Strategies on Special-Purpose Hardware. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
Crypto Attacks, Hash functions, Special-purpose Hardware |
1 | Rupert J. Hartung |
Cryptography Based on Quadratic Forms: Complexity Considerations. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | María Naya-Plasencia |
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
Achterbahn, cryptanalysis, stream cipher, correlation attack, eSTREAM, linear approximation, parity check, key-recovery attack |
1 | Anja Korsten |
Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
MOR cryptosystem, inner automorphism problem, public key cryptography, discrete logarithm problem, non-abelian group |
1 | Gautham Sekar, Souradyuti Paul, Bart Preneel |
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Léonard Dallot |
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Waldyr D. Benits Junior, Steven D. Galbraith |
The GPS Identification Scheme Using Frobenius Expansions. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
GPS identificaion scheme, Elliptic Curves, Frobenius expansions |
1 | Nicolas T. Courtois, Blandine Debraize |
Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
algebraic attacks on block ciphers, Gröbner bases, design of S-boxes, Rijndael, algebraic immunity, Serpent, multivariate equations |
1 | Adil Alsaid, Chris J. Mitchell |
A Scanning Tool for PC Root Public Key Stores. |
WEWoRC |
2005 |
DBLP BibTeX RDF |
|
1 | Christopher Wolf, Stefan Lucks, Po-Wah Yau (eds.) |
WEWoRC 2005 - Western European Workshop on Research in Cryptology, July 5-7, 2005, Leuven, Belgium |
WEWoRC |
2005 |
DBLP BibTeX RDF |
|
1 | Jaechul Sung, Jongsung Kim, Changhoon Lee, Seokhie Hong |
Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds. |
WEWoRC |
2005 |
DBLP BibTeX RDF |
|
1 | Frederik Armknecht |
Algebraic Attacks and Annihilators. |
WEWoRC |
2005 |
DBLP BibTeX RDF |
|
1 | Heiko Stamer |
Efficient Electronic Gambling: An Extended Implementation of the Toolbox for Mental Card Games. |
WEWoRC |
2005 |
DBLP BibTeX RDF |
|
1 | Marie Virat |
A cryptosystem "à la" ElGamal on an elliptic curve over Fp [epsilon]. |
WEWoRC |
2005 |
DBLP BibTeX RDF |
|
1 | Alexandre Ruiz, Jorge Luis Villar |
Publicly Verfiable Secret Sharing from Paillier's Cryptosystem. |
WEWoRC |
2005 |
DBLP BibTeX RDF |
|
1 | Cédric Lauradoux |
Collision attacks on processors with cache and countermeasures. |
WEWoRC |
2005 |
DBLP BibTeX RDF |
|
1 | Stefan Lucks, Nico Schmoigl, Emin Islam Tatli |
Issues on Designing a Cryptographic Compiler. |
WEWoRC |
2005 |
DBLP BibTeX RDF |
|
1 | Andrey Sidorenko, Berry Schoenmakers |
State Recovery Attacks on Pseudorandom Generators. |
WEWoRC |
2005 |
DBLP BibTeX RDF |
|
1 | Eabhnat Ní Fhloinn, Michael Purser |
Applications of Hiding in RSA. |
WEWoRC |
2005 |
DBLP BibTeX RDF |
|
1 | Krystian Matusiewicz, Josef Pieprzyk, Norbert Pramstaller, Christian Rechberger, Vincent Rijmen |
Analysis of simplified variants of SHA-256. |
WEWoRC |
2005 |
DBLP BibTeX RDF |
|
1 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Secure Network Storage System with Information Privacy. |
WEWoRC |
2005 |
DBLP BibTeX RDF |
|
Displaying result #1 - #37 of 37 (100 per page; Change: )
|
|