Search dblp for Publications

export results for "toc:db/conf/fse/fse2010.bht:"

 download as .bib file

@inproceedings{DBLP:conf/fse/AumassonGKMM10,
  author       = {Jean{-}Philippe Aumasson and
                  Jian Guo and
                  Simon Knellwolf and
                  Krystian Matusiewicz and
                  Willi Meier},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Differential and Invertibility Properties of {BLAKE}},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {318--332},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_18},
  doi          = {10.1007/978-3-642-13858-4\_18},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AumassonGKMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BhattacharyyaMN10,
  author       = {Rishiraj Bhattacharyya and
                  Avradip Mandal and
                  Mridul Nandi},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Security Analysis of the Mode of {JH} Hash Function},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {168--191},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_10},
  doi          = {10.1007/978-3-642-13858-4\_10},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/BhattacharyyaMN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BilletEG10,
  author       = {Olivier Billet and
                  Jonathan Etrog and
                  Henri Gilbert},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Lightweight Privacy Preserving Authentication for {RFID} Using a Stream
                  Cipher},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {55--74},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_4},
  doi          = {10.1007/978-3-642-13858-4\_4},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BilletEG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/BouillaguetDLF10,
  author       = {Charles Bouillaguet and
                  Orr Dunkelman and
                  Ga{\"{e}}tan Leurent and
                  Pierre{-}Alain Fouque},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Another Look at Complementation Properties},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {347--364},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_20},
  doi          = {10.1007/978-3-642-13858-4\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/BouillaguetDLF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/GilbertP10,
  author       = {Henri Gilbert and
                  Thomas Peyrin},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Super-Sbox Cryptanalysis: Improved Attacks for AES-Like Permutations},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {365--383},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_21},
  doi          = {10.1007/978-3-642-13858-4\_21},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/GilbertP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/KhovratovichN10,
  author       = {Dmitry Khovratovich and
                  Ivica Nikolic},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Rotational Cryptanalysis of {ARX}},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {333--346},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_19},
  doi          = {10.1007/978-3-642-13858-4\_19},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/KhovratovichN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Minematsu10,
  author       = {Kazuhiko Minematsu},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {How to Thwart Birthday Attacks against MACs via Small Randomness},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {230--249},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_13},
  doi          = {10.1007/978-3-642-13858-4\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Minematsu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Mironov10,
  author       = {Ilya Mironov},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Domain Extension for Enhanced Target Collision-Resistant Hash Functions},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {153--167},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_9},
  doi          = {10.1007/978-3-642-13858-4\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Mironov10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Nandi10,
  author       = {Mridul Nandi},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {A Unified Method for Improving {PRF} Bounds for a Class of Blockcipher
                  Based MACs},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {212--229},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_12},
  doi          = {10.1007/978-3-642-13858-4\_12},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/Nandi10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Naya-PlasenciaRALLMP10,
  author       = {Mar{\'{\i}}a Naya{-}Plasencia and
                  Andrea R{\"{o}}ck and
                  Jean{-}Philippe Aumasson and
                  Yann Laigle{-}Chapuy and
                  Ga{\"{e}}tan Leurent and
                  Willi Meier and
                  Thomas Peyrin},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Cryptanalysis of {ESSENCE}},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {134--152},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_8},
  doi          = {10.1007/978-3-642-13858-4\_8},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Naya-PlasenciaRALLMP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/NohlTW10,
  author       = {Karsten Nohl and
                  Erik Tews and
                  Ralf{-}Philipp Weinmann},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Cryptanalysis of the {DECT} Standard Cipher},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_1},
  doi          = {10.1007/978-3-642-13858-4\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/NohlTW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/OsvikBSC10,
  author       = {Dag Arne Osvik and
                  Joppe W. Bos and
                  Deian Stefan and
                  David Canright},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Fast Software {AES} Encryption},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {75--93},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_5},
  doi          = {10.1007/978-3-642-13858-4\_5},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/OsvikBSC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/OzenSS10,
  author       = {Onur {\"{O}}zen and
                  Thomas Shrimpton and
                  Martijn Stam},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Attacking the Knudsen-Preneel Compression Functions},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {94--115},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_6},
  doi          = {10.1007/978-3-642-13858-4\_6},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/OzenSS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ReyhanitabarSM10,
  author       = {Mohammad Reza Reyhanitabar and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions
                  and Relationships},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {192--211},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_11},
  doi          = {10.1007/978-3-642-13858-4\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ReyhanitabarSM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RijmenTV10,
  author       = {Vincent Rijmen and
                  Deniz Toz and
                  Kerem Varici},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Rebound Attack on Reduced-Round Versions of {JH}},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {286--303},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_16},
  doi          = {10.1007/978-3-642-13858-4\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RijmenTV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/RonjomC10,
  author       = {Sondre R{\o}njom and
                  Carlos Cid},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Nonlinear Equivalence of Stream Ciphers},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {40--54},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_3},
  doi          = {10.1007/978-3-642-13858-4\_3},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/RonjomC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SuzakiM10,
  author       = {Tomoyasu Suzaki and
                  Kazuhiko Minematsu},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Improving the Generalized Feistel},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {19--39},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_2},
  doi          = {10.1007/978-3-642-13858-4\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SuzakiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Thomsen10,
  author       = {S{\o}ren S. Thomsen},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Pseudo-cryptanalysis of the Original Blue Midnight Wish},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {304--317},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_17},
  doi          = {10.1007/978-3-642-13858-4\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Thomsen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WangS10,
  author       = {Lei Wang and
                  Yu Sasaki},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Finding Preimages of Tiger Up to 23 Steps},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {116--133},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_7},
  doi          = {10.1007/978-3-642-13858-4\_7},
  timestamp    = {Tue, 02 Oct 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/WangS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/WatanabeHYK10,
  author       = {Dai Watanabe and
                  Yasuo Hatano and
                  Tsuyoshi Yamada and
                  Toshinobu Kaneko},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Higher Order Differential Attack on Step-Reduced Variants of \emph{Luffa}
                  v1},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {270--285},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_15},
  doi          = {10.1007/978-3-642-13858-4\_15},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/WatanabeHYK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/ZhangWWZWL10,
  author       = {Liting Zhang and
                  Wenling Wu and
                  Peng Wang and
                  Lei Zhang and
                  Shuang Wu and
                  Bo Liang},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Constructing Rate-1 MACs from Related-Key Unpredictable Block Ciphers:
                  {PGV} Model Revisited},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {250--269},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_14},
  doi          = {10.1007/978-3-642-13858-4\_14},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/ZhangWWZWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fse/2010,
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4},
  doi          = {10.1007/978-3-642-13858-4},
  isbn         = {978-3-642-13857-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics