Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2014
- Shiho Moriai:
Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers. Lecture Notes in Computer Science 8424, Springer 2014, ISBN 978-3-662-43932-6 [contents] - 2013
- Farzaneh Abed, Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:
A Framework for Automated Independent-Biclique Cryptanalysis. FSE 2013: 561-581 - Elena Andreeva, Andrey Bogdanov, Bart Mennink:
Towards Understanding the Known-Key Security of Block Ciphers. FSE 2013: 348-366 - Rishiraj Bhattacharyya, Arnab Roy:
Secure Message Authentication Against Related-Key Attack. FSE 2013: 305-324 - Alex Biryukov, Ivica Nikolic:
Complementing Feistel Ciphers. FSE 2013: 3-18 - Andrey Bogdanov, Florian Mendel, Francesco Regazzoni, Vincent Rijmen, Elmar Tischhauser:
ALE: AES-Based Lightweight Authenticated Encryption. FSE 2013: 447-466 - Andrey Bogdanov, Elmar Tischhauser:
On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui's Algorithm 2. FSE 2013: 19-38 - Alexandra Boldyreva, Jean Paul Degabriele, Kenneth G. Paterson, Martijn Stam:
On Symmetric Encryption with Distinguishable Decryption Failures. FSE 2013: 367-390 - Christina Boura, Anne Canteaut:
A New Criterion for Avoiding the Propagation of Linear Relations Through an Sbox. FSE 2013: 585-604 - Ioana Boureanu, Aikaterini Mitrokotsa, Serge Vaudenay:
Towards Secure Distance Bounding. FSE 2013: 55-67 - Jean-Sébastien Coron, Emmanuel Prouff, Matthieu Rivain, Thomas Roche:
Higher-Order Side Channel Security and Mask Refreshing. FSE 2013: 410-424 - Patrick Derbez, Pierre-Alain Fouque:
Exhausting Demirci-Selçuk Meet-in-the-Middle Attacks Against Reduced-Round AES. FSE 2013: 541-560 - Itai Dinur, Orr Dunkelman, Adi Shamir:
Collision Attacks on Up to 5 Rounds of SHA-3 Using Generalized Internal Differentials. FSE 2013: 219-240 - Pierre-Alain Fouque, Thomas Vannet:
Improving Key Recovery to 784 and 799 Rounds of Trivium Using Optimized Cube Attacks. FSE 2013: 502-517 - Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, Masakatu Morii:
Full Plaintext Recovery Attack on Broadcast RC4. FSE 2013: 179-202 - Jérémy Jean, Ivica Nikolic, Thomas Peyrin, Lei Wang, Shuang Wu:
Security Analysis of PRINCE. FSE 2013: 92-111 - Rodolphe Lampe, Yannick Seurin:
Tweakable Blockciphers with Asymptotically Optimal Security. FSE 2013: 133-151 - Gaëtan Leurent:
Cryptanalysis of WIDEA. FSE 2013: 39-51 - Gaëtan Leurent:
Time-Memory Trade-Offs for Near-Collisions. FSE 2013: 205-218 - Ruilin Li, Heng Li, Chao Li, Bing Sun:
A Low Data Complexity Attack on the GMR-2 Cipher Used in the Satellite Phones. FSE 2013: 485-501 - Mitsuru Matsui, Yumiko Murakami:
Minimalism of Software Implementation - Extensive Performance Analysis of Symmetric Primitives on the RL78 Microcontroller. FSE 2013: 393-409 - Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata:
Attacks and Security Proofs of EAX-Prime. FSE 2013: 327-347 - Pawel Morawiecki, Josef Pieprzyk, Marian Srebrny:
Rotational Cryptanalysis of Round-Reduced Keccak. FSE 2013: 241-262 - Ivica Nikolic, Lei Wang, Shuang Wu:
Cryptanalysis of Round-Reduced \mathttLED. FSE 2013: 112-129 - Gordon Procter, Carlos Cid:
On Weak Keys and Forgery Attacks Against Polynomial-Based MAC Schemes. FSE 2013: 287-304 - Markku-Juhani O. Saarinen:
Related-Key Attacks Against Full Hummingbird-2. FSE 2013: 467-482 - Pouyan Sepehrdad, Petr Susil, Serge Vaudenay, Martin Vuagnoux:
Smashing WEP in a Passive Attack. FSE 2013: 155-178 - Hadi Soleimany, Céline Blondeau, Xiaoli Yu, Wenling Wu, Kaisa Nyberg, Huiling Zhang, Lei Zhang, Yanfeng Wang:
Reflection Cryptanalysis of PRINCE-Like Ciphers. FSE 2013: 71-91 - Michael Tunstall, Carolyn Whitnall, Elisabeth Oswald:
Masking Tables - An Underestimated Security Risk. FSE 2013: 425-444 - Hongbo Yu, Jiazhe Chen, Xiaoyun Wang:
Partial-Collision Attack on the Round-Reduced Compression Function of Skein-256. FSE 2013: 263-283
skipping 1 more match
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-19 17:09 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint