Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/fse/fse2010.bht:"
@inproceedings{DBLP:conf/fse/AumassonGKMM10, author = {Jean{-}Philippe Aumasson and Jian Guo and Simon Knellwolf and Krystian Matusiewicz and Willi Meier}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Differential and Invertibility Properties of {BLAKE}}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {318--332}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_18}, doi = {10.1007/978-3-642-13858-4\_18}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/AumassonGKMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BhattacharyyaMN10, author = {Rishiraj Bhattacharyya and Avradip Mandal and Mridul Nandi}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Security Analysis of the Mode of {JH} Hash Function}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {168--191}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_10}, doi = {10.1007/978-3-642-13858-4\_10}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/BhattacharyyaMN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BilletEG10, author = {Olivier Billet and Jonathan Etrog and Henri Gilbert}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Lightweight Privacy Preserving Authentication for {RFID} Using a Stream Cipher}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {55--74}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_4}, doi = {10.1007/978-3-642-13858-4\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BilletEG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/BouillaguetDLF10, author = {Charles Bouillaguet and Orr Dunkelman and Ga{\"{e}}tan Leurent and Pierre{-}Alain Fouque}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Another Look at Complementation Properties}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {347--364}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_20}, doi = {10.1007/978-3-642-13858-4\_20}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/BouillaguetDLF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/GilbertP10, author = {Henri Gilbert and Thomas Peyrin}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {365--383}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_21}, doi = {10.1007/978-3-642-13858-4\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/GilbertP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/KhovratovichN10, author = {Dmitry Khovratovich and Ivica Nikolic}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Rotational Cryptanalysis of {ARX}}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {333--346}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_19}, doi = {10.1007/978-3-642-13858-4\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/KhovratovichN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Minematsu10, author = {Kazuhiko Minematsu}, editor = {Seokhie Hong and Tetsu Iwata}, title = {How to Thwart Birthday Attacks against MACs via Small Randomness}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {230--249}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_13}, doi = {10.1007/978-3-642-13858-4\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Minematsu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Mironov10, author = {Ilya Mironov}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Domain Extension for Enhanced Target Collision-Resistant Hash Functions}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {153--167}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_9}, doi = {10.1007/978-3-642-13858-4\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Mironov10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Nandi10, author = {Mridul Nandi}, editor = {Seokhie Hong and Tetsu Iwata}, title = {A Unified Method for Improving {PRF} Bounds for a Class of Blockcipher Based MACs}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {212--229}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_12}, doi = {10.1007/978-3-642-13858-4\_12}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/Nandi10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Naya-PlasenciaRALLMP10, author = {Mar{\'{\i}}a Naya{-}Plasencia and Andrea R{\"{o}}ck and Jean{-}Philippe Aumasson and Yann Laigle{-}Chapuy and Ga{\"{e}}tan Leurent and Willi Meier and Thomas Peyrin}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Cryptanalysis of {ESSENCE}}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {134--152}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_8}, doi = {10.1007/978-3-642-13858-4\_8}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Naya-PlasenciaRALLMP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/NohlTW10, author = {Karsten Nohl and Erik Tews and Ralf{-}Philipp Weinmann}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Cryptanalysis of the {DECT} Standard Cipher}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {1--18}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_1}, doi = {10.1007/978-3-642-13858-4\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/NohlTW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/OsvikBSC10, author = {Dag Arne Osvik and Joppe W. Bos and Deian Stefan and David Canright}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Fast Software {AES} Encryption}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {75--93}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_5}, doi = {10.1007/978-3-642-13858-4\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/OsvikBSC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/OzenSS10, author = {Onur {\"{O}}zen and Thomas Shrimpton and Martijn Stam}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Attacking the Knudsen-Preneel Compression Functions}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {94--115}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_6}, doi = {10.1007/978-3-642-13858-4\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/OzenSS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ReyhanitabarSM10, author = {Mohammad Reza Reyhanitabar and Willy Susilo and Yi Mu}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {192--211}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_11}, doi = {10.1007/978-3-642-13858-4\_11}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ReyhanitabarSM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RijmenTV10, author = {Vincent Rijmen and Deniz Toz and Kerem Varici}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Rebound Attack on Reduced-Round Versions of {JH}}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {286--303}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_16}, doi = {10.1007/978-3-642-13858-4\_16}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RijmenTV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/RonjomC10, author = {Sondre R{\o}njom and Carlos Cid}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Nonlinear Equivalence of Stream Ciphers}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {40--54}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_3}, doi = {10.1007/978-3-642-13858-4\_3}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/RonjomC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SuzakiM10, author = {Tomoyasu Suzaki and Kazuhiko Minematsu}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Improving the Generalized Feistel}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {19--39}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_2}, doi = {10.1007/978-3-642-13858-4\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/SuzakiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Thomsen10, author = {S{\o}ren S. Thomsen}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Pseudo-cryptanalysis of the Original Blue Midnight Wish}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {304--317}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_17}, doi = {10.1007/978-3-642-13858-4\_17}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Thomsen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WangS10, author = {Lei Wang and Yu Sasaki}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Finding Preimages of Tiger Up to 23 Steps}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {116--133}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_7}, doi = {10.1007/978-3-642-13858-4\_7}, timestamp = {Tue, 02 Oct 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/WangS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/WatanabeHYK10, author = {Dai Watanabe and Yasuo Hatano and Tsuyoshi Yamada and Toshinobu Kaneko}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Higher Order Differential Attack on Step-Reduced Variants of \emph{Luffa} v1}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {270--285}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_15}, doi = {10.1007/978-3-642-13858-4\_15}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/WatanabeHYK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/ZhangWWZWL10, author = {Liting Zhang and Wenling Wu and Peng Wang and Lei Zhang and Shuang Wu and Bo Liang}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers: {PGV} Model Revisited}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {250--269}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_14}, doi = {10.1007/978-3-642-13858-4\_14}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/ZhangWWZWL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fse/2010, editor = {Seokhie Hong and Tetsu Iwata}, title = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4}, doi = {10.1007/978-3-642-13858-4}, isbn = {978-3-642-13857-7}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.