Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Matthew J. B. Robshaw
@inproceedings{DBLP:conf/acns/BlackburnR16, author = {Simon R. Blackburn and Matthew J. B. Robshaw}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {On the Security of the Algebraic Eraser Tag Authentication Protocol}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {3--17}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_1}, doi = {10.1007/978-3-319-39555-5\_1}, timestamp = {Fri, 07 Aug 2020 17:57:32 +0200}, biburl = {https://dblp.org/rec/conf/acns/BlackburnR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2016-1, editor = {Matthew Robshaw and Jonathan Katz}, title = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9814}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53018-4}, doi = {10.1007/978-3-662-53018-4}, isbn = {978-3-662-53017-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2016-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2016-2, editor = {Matthew Robshaw and Jonathan Katz}, title = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5}, doi = {10.1007/978-3-662-53008-5}, isbn = {978-3-662-53007-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2016-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2016-3, editor = {Matthew Robshaw and Jonathan Katz}, title = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {9816}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53015-3}, doi = {10.1007/978-3-662-53015-3}, isbn = {978-3-662-53014-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2016-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/BlackburnR16, author = {Simon R. Blackburn and Matthew J. B. Robshaw}, title = {On the security of the Algebraic Eraser tag authentication protocol}, journal = {CoRR}, volume = {abs/1602.00860}, year = {2016}, url = {http://arxiv.org/abs/1602.00860}, eprinttype = {arXiv}, eprint = {1602.00860}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/BlackburnR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackburnR16, author = {Simon R. Blackburn and Matthew J. B. Robshaw}, title = {On the Security of the Algebraic Eraser Tag Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {91}, year = {2016}, url = {http://eprint.iacr.org/2016/091}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackburnR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jce/BatinaR15, author = {Lejla Batina and Matthew J. B. Robshaw}, title = {Introduction to the {CHES} 2014 special issue}, journal = {J. Cryptogr. Eng.}, volume = {5}, number = {2}, pages = {71--72}, year = {2015}, url = {https://doi.org/10.1007/s13389-015-0098-x}, doi = {10.1007/S13389-015-0098-X}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jce/BatinaR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rfidsec/CidFPR15, author = {Carlos Cid and Lo{\"{\i}}c Ferreira and Gordon Procter and Matthew J. B. Robshaw}, editor = {Stefan Mangard and Patrick Schaumont}, title = {Algebraic Cryptanalysis and {RFID} Authentication}, booktitle = {Radio Frequency Identification. Security and Privacy Issues - 11th International Workshop, RFIDsec 2015, New York, NY, USA, June 23-24, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9440}, pages = {104--121}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24837-0\_7}, doi = {10.1007/978-3-319-24837-0\_7}, timestamp = {Mon, 15 Jun 2020 17:08:11 +0200}, biburl = {https://dblp.org/rec/conf/rfidsec/CidFPR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2015-1, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9215}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-47989-6}, doi = {10.1007/978-3-662-47989-6}, isbn = {978-3-662-47988-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2015-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/crypto/2015-2, editor = {Rosario Gennaro and Matthew Robshaw}, title = {Advances in Cryptology - {CRYPTO} 2015 - 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9216}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48000-7}, doi = {10.1007/978-3-662-48000-7}, isbn = {978-3-662-47999-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/2015-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2014, editor = {Lejla Batina and Matthew Robshaw}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3}, doi = {10.1007/978-3-662-44709-3}, isbn = {978-3-662-44708-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PoschmannR12, author = {Axel Poschmann and Matthew J. B. Robshaw}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {On Area, Time, and the Right Trade-Off}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {404--418}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_30}, doi = {10.1007/978-3-642-31448-3\_30}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PoschmannR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/CanardFR12, author = {S{\'{e}}bastien Canard and Lo{\"{\i}}c Ferreira and Matthew Robshaw}, editor = {Stefan Mangard}, title = {Improved (and Practical) Public-Key Authentication for {UHF} {RFID} Tags}, booktitle = {Smart Card Research and Advanced Applications - 11th International Conference, {CARDIS} 2012, Graz, Austria, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7771}, pages = {46--61}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37288-9\_4}, doi = {10.1007/978-3-642-37288-9\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/CanardFR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/0001PPR12, author = {Jian Guo and Thomas Peyrin and Axel Poschmann and Matthew J. B. Robshaw}, title = {The {LED} Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2012}, url = {http://eprint.iacr.org/2012/600}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/0001PPR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0028270, author = {Lars R. Knudsen and Matthew Robshaw}, title = {The Block Cipher Companion}, series = {Information Security and Cryptography}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-17342-4}, doi = {10.1007/978-3-642-17342-4}, isbn = {978-3-642-17341-7}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0028270.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/GuoPPR11, author = {Jian Guo and Thomas Peyrin and Axel Poschmann and Matthew J. B. Robshaw}, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {The {LED} Block Cipher}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, pages = {326--341}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9\_22}, doi = {10.1007/978-3-642-23951-9\_22}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/GuoPPR11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/NguyenRW11, author = {Phuong Ha Nguyen and Matthew J. B. Robshaw and Huaxiong Wang}, editor = {Daniel J. Bernstein and Sanjit Chatterjee}, title = {On Related-Key Attacks and {KASUMI:} The Case of {A5/3}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2011 - 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7107}, pages = {146--159}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25578-6\_12}, doi = {10.1007/978-3-642-25578-6\_12}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/NguyenRW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Robshaw11, author = {Matthew J. B. Robshaw}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {One-Way Function}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {887--888}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_467}, doi = {10.1007/978-1-4419-5906-5\_467}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Robshaw11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Robshaw11a, author = {Matthew J. B. Robshaw}, editor = {Henk C. A. van Tilborg and Sushil Jajodia}, title = {Trapdoor One-Way Function}, booktitle = {Encyclopedia of Cryptography and Security, 2nd Ed}, pages = {1317--1318}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-1-4419-5906-5\_482}, doi = {10.1007/978-1-4419-5906-5\_482}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Robshaw11a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-cdt/ONeillR10, author = {M{\'{a}}ire O'Neill and Matthew J. B. Robshaw}, title = {Low-cost digital signature architecture suitable for radio frequency identification tags}, journal = {{IET} Comput. Digit. Tech.}, volume = {4}, number = {1}, pages = {14--26}, year = {2010}, url = {https://doi.org/10.1049/iet-cdt.2008.0165}, doi = {10.1049/IET-CDT.2008.0165}, timestamp = {Tue, 14 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-cdt/ONeillR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/PoschmannRVP10, author = {Axel Poschmann and Matthew J. B. Robshaw and Frank Vater and Christof Paar}, title = {Lightweight Cryptography and {RFID:} Tackling the Hidden Overhead}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {4}, number = {2}, pages = {98--116}, year = {2010}, url = {https://doi.org/10.3837/tiis.2010.04.002}, doi = {10.3837/TIIS.2010.04.002}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/PoschmannRVP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/EtrogR10, author = {Jonathan Etrog and Matthew J. B. Robshaw}, editor = {Ron Steinfeld and Philip Hawkes}, title = {On Unbiased Linear Approximations}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {74--86}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_5}, doi = {10.1007/978-3-642-14081-5\_5}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/EtrogR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KnudsenLPR10, author = {Lars R. Knudsen and Gregor Leander and Axel Poschmann and Matthew J. B. Robshaw}, editor = {Stefan Mangard and Fran{\c{c}}ois{-}Xavier Standaert}, title = {PRINTcipher: {A} Block Cipher for IC-Printing}, booktitle = {Cryptographic Hardware and Embedded Systems, {CHES} 2010, 12th International Workshop, Santa Barbara, CA, USA, August 17-20, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6225}, pages = {16--32}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15031-9\_2}, doi = {10.1007/978-3-642-15031-9\_2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/KnudsenLPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BenadjilaBGR09, author = {Ryad Benadjila and Olivier Billet and Shay Gueron and Matthew J. B. Robshaw}, editor = {Mitsuru Matsui}, title = {The Intel {AES} Instructions Set and the {SHA-3} Candidates}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {162--178}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_10}, doi = {10.1007/978-3-642-10366-7\_10}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BenadjilaBGR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PoschmannRVP09, author = {Axel Poschmann and Matthew J. B. Robshaw and Frank Vater and Christof Paar}, editor = {Dong Hoon Lee and Seokhie Hong}, title = {Lightweight Cryptography and {RFID:} Tackling the Hidden Overheads}, booktitle = {Information, Security and Cryptology - {ICISC} 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5984}, pages = {129--145}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-14423-3\_10}, doi = {10.1007/978-3-642-14423-3\_10}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PoschmannRVP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BilletRSY08, author = {Olivier Billet and Matthew J. B. Robshaw and Yannick Seurin and Yiqun Lisa Yin}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {Looking Back at a New Hash Function}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {239--253}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_18}, doi = {10.1007/978-3-540-70500-0\_18}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BilletRSY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/KasperRBRRS08, author = {Emilia K{\"{a}}sper and Vincent Rijmen and Tor E. Bj{\o}rstad and Christian Rechberger and Matthew J. B. Robshaw and Gautham Sekar}, editor = {Serge Vaudenay}, title = {Correlated Keystreams in Moustique}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5023}, pages = {246--257}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68164-9\_17}, doi = {10.1007/978-3-540-68164-9\_17}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/KasperRBRRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BogdanovLPPRS08, author = {Andrey Bogdanov and Gregor Leander and Christof Paar and Axel Poschmann and Matthew J. B. Robshaw and Yannick Seurin}, editor = {Elisabeth Oswald and Pankaj Rohatgi}, title = {Hash Functions and {RFID} Tags: Mind the Gap}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2008, 10th International Workshop, Washington, D.C., USA, August 10-13, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5154}, pages = {283--299}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85053-3\_18}, doi = {10.1007/978-3-540-85053-3\_18}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/BogdanovLPPRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GilbertRS08, author = {Henri Gilbert and Matthew J. B. Robshaw and Yannick Seurin}, editor = {Nigel P. Smart}, title = {HB\({}^{\mbox{{\#}}}\): Increasing the Security and Efficiency of HB\({}^{\mbox{+}}\)}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {361--378}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_21}, doi = {10.1007/978-3-540-78967-3\_21}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GilbertRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/GilbertRS08, author = {Henri Gilbert and Matthew J. B. Robshaw and Yannick Seurin}, editor = {Gene Tsudik}, title = {Good Variants of HB\({}^{\mbox{+}}\) Are Hard to Find}, booktitle = {Financial Cryptography and Data Security, 12th International Conference, {FC} 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5143}, pages = {156--170}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85230-8\_12}, doi = {10.1007/978-3-540-85230-8\_12}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/GilbertRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icalp/GilbertRS08, author = {Henri Gilbert and Matthew J. B. Robshaw and Yannick Seurin}, editor = {Luca Aceto and Ivan Damg{\aa}rd and Leslie Ann Goldberg and Magn{\'{u}}s M. Halld{\'{o}}rsson and Anna Ing{\'{o}}lfsd{\'{o}}ttir and Igor Walukiewicz}, title = {How to Encrypt with the {LPN} Problem}, booktitle = {Automata, Languages and Programming, 35th International Colloquium, {ICALP} 2008, Reykjavik, Iceland, July 7-11, 2008, Proceedings, Part {II} - Track {B:} Logic, Semantics, and Theory of Programming {\&} Track {C:} Security and Cryptography Foundations}, series = {Lecture Notes in Computer Science}, volume = {5126}, pages = {679--690}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70583-3\_55}, doi = {10.1007/978-3-540-70583-3\_55}, timestamp = {Fri, 27 Mar 2020 09:02:59 +0100}, biburl = {https://dblp.org/rec/conf/icalp/GilbertRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/EtrogR08, author = {Jonathan Etrog and Matthew J. B. Robshaw}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {The Cryptanalysis of Reduced-Round {SMS4}}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {51--65}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_4}, doi = {10.1007/978-3-642-04159-4\_4}, timestamp = {Thu, 07 Sep 2023 13:44:11 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/EtrogR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/lncs/Robshaw08, author = {Matthew Robshaw}, editor = {Matthew J. B. Robshaw and Olivier Billet}, title = {The eSTREAM Project}, booktitle = {New Stream Cipher Designs - The eSTREAM Finalists}, series = {Lecture Notes in Computer Science}, volume = {4986}, pages = {1--6}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68351-3\_1}, doi = {10.1007/978-3-540-68351-3\_1}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/series/lncs/Robshaw08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/lncs/4986, editor = {Matthew J. B. Robshaw and Olivier Billet}, title = {New Stream Cipher Designs - The eSTREAM Finalists}, series = {Lecture Notes in Computer Science}, volume = {4986}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68351-3}, doi = {10.1007/978-3-540-68351-3}, isbn = {978-3-540-68350-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/lncs/4986.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GilbertRS08, author = {Henri Gilbert and Matthew J. B. Robshaw and Yannick Seurin}, title = {HB{\#}: Increasing the Security and Efficiency of {HB+}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {28}, year = {2008}, url = {http://eprint.iacr.org/2008/028}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GilbertRS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BilletRP07, author = {Olivier Billet and Matthew J. B. Robshaw and Thomas Peyrin}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {On Building Hash Functions from Multivariate Quadratic Equations}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {82--95}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_7}, doi = {10.1007/978-3-540-73458-1\_7}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BilletRP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/BogdanovKLPPRSV07, author = {Andrey Bogdanov and Lars R. Knudsen and Gregor Leander and Christof Paar and Axel Poschmann and Matthew J. B. Robshaw and Yannick Seurin and C. Vikkelsoe}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {{PRESENT:} An Ultra-Lightweight Block Cipher}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {450--466}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_31}, doi = {10.1007/978-3-540-74735-2\_31}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/BogdanovKLPPRSV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/McLooneR07, author = {M{\'{a}}ire McLoone and Matthew J. B. Robshaw}, editor = {Masayuki Abe}, title = {Public Key Cryptography and {RFID} Tags}, booktitle = {Topics in Cryptology - {CT-RSA} 2007, The Cryptographers' Track at the {RSA} Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4377}, pages = {372--384}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/11967668\_24}, doi = {10.1007/11967668\_24}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/McLooneR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/McLooneR07, author = {M{\'{a}}ire McLoone and Matthew J. B. Robshaw}, title = {New Architectures for Low-Cost Public Key Cryptography on {RFID} Tags}, booktitle = {International Symposium on Circuits and Systems {(ISCAS} 2007), 27-20 May 2007, New Orleans, Louisiana, {USA}}, pages = {1827--1830}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/ISCAS.2007.378269}, doi = {10.1109/ISCAS.2007.378269}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/McLooneR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/daglib/0019058, author = {Carlos Cid and Sean Murphy and Matthew J. B. Robshaw}, title = {Algebraic aspects of the advanced encryption standard}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-0-387-36842-9}, doi = {10.1007/978-0-387-36842-9}, isbn = {978-0-387-24363-4}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/daglib/0019058.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Robshaw06, author = {Matthew J. B. Robshaw}, title = {An overview of {RFID} tags and new cryptographic developments}, journal = {Inf. Secur. Tech. Rep.}, volume = {11}, number = {2}, pages = {82--88}, year = {2006}, url = {https://doi.org/10.1016/j.istr.2006.03.006}, doi = {10.1016/J.ISTR.2006.03.006}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/Robshaw06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/PeyrinGMR06, author = {Thomas Peyrin and Henri Gilbert and Fr{\'{e}}d{\'{e}}ric Muller and Matthew J. B. Robshaw}, editor = {Xuejia Lai and Kefei Chen}, title = {Combining Compression Functions and Block Cipher-Based Hash Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {315--331}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_21}, doi = {10.1007/11935230\_21}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/PeyrinGMR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/FischerMBBR06, author = {Simon Fischer and Willi Meier and C{\^{o}}me Berbain and Jean{-}Fran{\c{c}}ois Biasse and Matthew J. B. Robshaw}, editor = {Rana Barua and Tanja Lange}, title = {Non-randomness in eSTREAM Candidates Salsa20 and {TSC-4}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4329}, pages = {2--16}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11941378\_2}, doi = {10.1007/11941378\_2}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/FischerMBBR06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vietcrypt/Robshaw06, author = {Matthew J. B. Robshaw}, editor = {Phong Q. Nguyen}, title = {Searching for Compact Algorithms: cgen}, booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4341}, pages = {37--49}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11958239\_3}, doi = {10.1007/11958239\_3}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/vietcrypt/Robshaw06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2006, editor = {Matthew J. B. Robshaw}, title = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313}, doi = {10.1007/11799313}, isbn = {3-540-36597-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2006.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/egc/LimR05, author = {Hoon Wei Lim and Matthew J. B. Robshaw}, editor = {Peter M. A. Sloot and Alfons G. Hoekstra and Thierry Priol and Alexander Reinefeld and Marian Bubak}, title = {A Dynamic Key Infrastructure for Grid}, booktitle = {Advances in Grid Computing - {EGC} 2005, European Grid Conference, Amsterdam, The Netherlands, February 14-16, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3470}, pages = {255--264}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11508380\_27}, doi = {10.1007/11508380\_27}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/egc/LimR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/CidMR05, author = {Carlos Cid and Sean Murphy and Matthew J. B. Robshaw}, editor = {Henri Gilbert and Helena Handschuh}, title = {Small Scale Variants of the {AES}}, booktitle = {Fast Software Encryption: 12th International Workshop, {FSE} 2005, Paris, France, February 21-23, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3557}, pages = {145--162}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11502760\_10}, doi = {10.1007/11502760\_10}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/CidMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/CidMR05, author = {Carlos Cid and Sean Murphy and Matthew J. B. Robshaw}, editor = {Nigel P. Smart}, title = {An Algebraic Framework for Cipher Embeddings}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {278--289}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_19}, doi = {10.1007/11586821\_19}, timestamp = {Wed, 18 Mar 2020 16:00:57 +0100}, biburl = {https://dblp.org/rec/conf/ima/CidMR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/JonssonR05, author = {Jakob Jonsson and Matthew J. B. Robshaw}, editor = {Serge Vaudenay}, title = {Securing {RSA-KEM} via the {AES}}, booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3386}, pages = {29--46}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/978-3-540-30580-4\_4}, doi = {10.1007/978-3-540-30580-4\_4}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/JonssonR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Robshaw05, author = {Matthew J. B. Robshaw}, editor = {Henk C. A. van Tilborg}, title = {One-Way Function}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_287}, doi = {10.1007/0-387-23483-7\_287}, timestamp = {Thu, 27 Jun 2019 15:50:13 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Robshaw05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:reference/crypt/Robshaw05a, author = {Matthew J. B. Robshaw}, editor = {Henk C. A. van Tilborg}, title = {Trapdoor One-Way Function}, booktitle = {Encyclopedia of Cryptography and Security}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/0-387-23483-7\_436}, doi = {10.1007/0-387-23483-7\_436}, timestamp = {Wed, 12 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/reference/crypt/Robshaw05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GilbertRS05, author = {Henri Gilbert and Matthew J. B. Robshaw and Herv{\'{e}} Sibert}, title = {An Active Attack Against {HB+} - {A} Provably Secure Lightweight Authentication Protocol}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {237}, year = {2005}, url = {http://eprint.iacr.org/2005/237}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GilbertRS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/DobbertinKR04, author = {Hans Dobbertin and Lars R. Knudsen and Matthew J. B. Robshaw}, editor = {Hans Dobbertin and Vincent Rijmen and Aleksandra Sowa}, title = {The Cryptanalysis of the {AES} - {A} Brief Survey}, booktitle = {Advanced Encryption Standard - AES, 4th International Conference, {AES} 2004, Bonn, Germany, May 10-12, 2004, Revised Selected and Invited Papers}, series = {Lecture Notes in Computer Science}, volume = {3373}, pages = {1--10}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11506447\_1}, doi = {10.1007/11506447\_1}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/aes/DobbertinKR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccS/LimR04, author = {Hoon Wei Lim and Matthew J. B. Robshaw}, editor = {Marian Bubak and G. Dick van Albada and Peter M. A. Sloot and Jack J. Dongarra}, title = {On Identity-Based Cryptography and Grid Computing}, booktitle = {Computational Science - {ICCS} 2004, 4th International Conference, Krak{\'{o}}w, Poland, June 6-9, 2004, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3036}, pages = {474--477}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24685-5\_69}, doi = {10.1007/978-3-540-24685-5\_69}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/iccS/LimR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/LeeSYRR04, author = {Ruby B. Lee and Zhijie Shi and Yiqun Lisa Yin and Ronald L. Rivest and Matthew J. B. Robshaw}, title = {On Permutation Operations in Cipher Design}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {569--577}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286714}, doi = {10.1109/ITCC.2004.1286714}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/LeeSYRR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-8/CiechanowiczMPR03, author = {Chez Ciechanowicz and Keith M. Martin and Fred Piper and Matthew J. B. Robshaw}, editor = {Cynthia E. Irvine and Helen L. Armstrong}, title = {Ten Years of Information Security Masters Programmes}, booktitle = {Security Education and Critical Infrastructures, {IFIP} {TC11} / {WG11.8} Third Annual World Conference on Information Security Education (WISE3), June 26-28, 2003, Monterey, California, {USA}}, series = {{IFIP} Conference Proceedings}, volume = {253}, pages = {215--230}, publisher = {Kluwer}, year = {2003}, timestamp = {Thu, 06 May 2004 14:39:20 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-8/CiechanowiczMPR03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/MurphyR02, author = {Sean Murphy and Matthew J. B. Robshaw}, title = {Key-Dependent S-Boxes and Differential Cryptanalysis}, journal = {Des. Codes Cryptogr.}, volume = {27}, number = {3}, pages = {229--255}, year = {2002}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/MurphyR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/MurphyR02, author = {Sean Murphy and Matthew J. B. Robshaw}, editor = {Moti Yung}, title = {Essential Algebraic Structure within the {AES}}, booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2442}, pages = {1--16}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45708-9\_1}, doi = {10.1007/3-540-45708-9\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/MurphyR02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HandschuhKR01, author = {Helena Handschuh and Lars R. Knudsen and Matthew J. B. Robshaw}, editor = {David Naccache}, title = {Analysis of {SHA-1} in Encryption Mode}, booktitle = {Topics in Cryptology - {CT-RSA} 2001, The Cryptographer's Track at {RSA} Conference 2001, San Francisco, CA, USA, April 8-12, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2020}, pages = {70--83}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45353-9\_7}, doi = {10.1007/3-540-45353-9\_7}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/HandschuhKR01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aes/RivestRY00, author = {Ronald L. Rivest and Matthew J. B. Robshaw and Yiqun Lisa Yin}, title = {{RC6} as the {AES}}, booktitle = {The Third Advanced Encryption Standard Candidate Conference, April 13-14, 2000, New York, New York, {USA}}, pages = {337--342}, publisher = {National Institute of Standards and Technology,}, year = {2000}, timestamp = {Thu, 08 Aug 2019 17:13:16 +0200}, biburl = {https://dblp.org/rec/conf/aes/RivestRY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KnudsenRW99, author = {Lars R. Knudsen and Matthew J. B. Robshaw and David A. Wagner}, editor = {Michael J. Wiener}, title = {Truncated Differentials and Skipjack}, booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1666}, pages = {165--180}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48405-1\_11}, doi = {10.1007/3-540-48405-1\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KnudsenRW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ContiniRRY99, author = {Scott Contini and Ronald L. Rivest and Matthew J. B. Robshaw and Yiqun Lisa Yin}, editor = {Lars R. Knudsen}, title = {Improved Analysis of Some Simplified Variants of {RC6}}, booktitle = {Fast Software Encryption, 6th International Workshop, {FSE} '99, Rome, Italy, March 24-26, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1636}, pages = {1--15}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48519-8\_1}, doi = {10.1007/3-540-48519-8\_1}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/ContiniRRY99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KnudsenRRR98, author = {Lars R. Knudsen and Vincent Rijmen and Ronald L. Rivest and Matthew J. B. Robshaw}, editor = {Serge Vaudenay}, title = {On the Design and Security of {RC2}}, booktitle = {Fast Software Encryption, 5th International Workshop, {FSE} '98, Paris, France, March 23-25, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1372}, pages = {206--221}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-69710-1\_14}, doi = {10.1007/3-540-69710-1\_14}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KnudsenRRR98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KnudsenR96, author = {Lars R. Knudsen and Matthew J. B. Robshaw}, editor = {Ueli M. Maurer}, title = {Non-Linear Approximations in Linear Cryptanalysis}, booktitle = {Advances in Cryptology - {EUROCRYPT} '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1070}, pages = {224--236}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/3-540-68339-9\_20}, doi = {10.1007/3-540-68339-9\_20}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KnudsenR96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dm/PatersonR95, author = {Kenneth G. Paterson and Matthew J. B. Robshaw}, title = {Storage efficient decoding for a class of binary be Bruijn sequences}, journal = {Discret. Math.}, volume = {138}, number = {1-3}, pages = {327--341}, year = {1995}, url = {https://doi.org/10.1016/0012-365X(94)00215-5}, doi = {10.1016/0012-365X(94)00215-5}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dm/PatersonR95.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Robshaw94, author = {Matthew J. B. Robshaw}, title = {On Evaluating the Linear Complexity of a Sequence of Least Period 2\({}^{\mbox{n}}\)}, journal = {Des. Codes Cryptogr.}, volume = {4}, number = {3}, pages = {263--269}, year = {1994}, url = {https://doi.org/10.1007/BF01388455}, doi = {10.1007/BF01388455}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Robshaw94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/KaliskiR94, author = {Burton S. Kaliski Jr. and Matthew J. B. Robshaw}, editor = {Yvo Desmedt}, title = {Linear Cryptanalysis Using Multiple Approximations}, booktitle = {Advances in Cryptology - {CRYPTO} '94, 14th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {839}, pages = {26--39}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-48658-5\_4}, doi = {10.1007/3-540-48658-5\_4}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/KaliskiR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KaliskiR94, author = {Burton S. Kaliski Jr. and Matthew J. B. Robshaw}, editor = {Bart Preneel}, title = {Linear Cryptanalysis Using Multiple Approximations and {FEAL}}, booktitle = {Fast Software Encryption: Second International Workshop. Leuven, Belgium, 14-16 December 1994, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1008}, pages = {249--264}, publisher = {Springer}, year = {1994}, url = {https://doi.org/10.1007/3-540-60590-8\_19}, doi = {10.1007/3-540-60590-8\_19}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KaliskiR94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KaliskiR93, author = {Burton S. Kaliski Jr. and Matthew J. B. Robshaw}, editor = {Ross J. Anderson}, title = {Fast Block Cipher Proposal}, booktitle = {Fast Software Encryption, Cambridge Security Workshop, Cambridge, UK, December 9-11, 1993, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {809}, pages = {33--40}, publisher = {Springer}, year = {1993}, url = {https://doi.org/10.1007/3-540-58108-1\_3}, doi = {10.1007/3-540-58108-1\_3}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/KaliskiR93.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.