default search action
11. FSE 2004: Delhi, India
- Bimal K. Roy, Willi Meier:
Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers. Lecture Notes in Computer Science 3017, Springer 2004, ISBN 3-540-22171-9 - Alexander Klimov, Adi Shamir:
New Cryptographic Primitives Based on Multiword T-Functions. 1-15 - David A. Wagner:
Towards a Unifying View of Block Cipher Cryptanalysis. 16-33 - Dong Hoon Lee, Jaeheon Kim, Jin Hong, Jae Woo Han, Dukjae Moon:
Algebraic Attacks on Summation Generators. 34-48 - Joo Yeon Cho, Josef Pieprzyk:
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering. 49-64 - Frederik Armknecht:
Improving Fast Algebraic Attacks. 65-82 - Jung Hee Cheon, Dong Hoon Lee:
Resistance of S-Boxes against Algebraic Attacks. 83-94 - Frédéric Muller:
Differential Attacks against the Helix Stream Cipher. 94-108 - Håvard Molland:
Improved Linear Consistency Attack on Irregular Clocked Keystream Generators. 109-126 - Håkan Englund, Martin Hell, Thomas Johansson:
Correlation Attacks Using a New Class of Weak Feedback Polynomials. 127-142 - Soumen Maity, Subhamoy Maitra:
Minimum Distance between Bent and 1-Resilient Boolean Functions. 143-160 - Pantelimon Stanica, Subhamoy Maitra, John A. Clark:
Results on Rotation Symmetric Bent and Correlation Immune Boolean Functions. 161-177 - Jovan Dj. Golic:
A Weakness of the Linear Part of Stream Cipher MUGI. 178-192 - Jin Hong, Dong Hoon Lee, Seongtaek Chee, Palash Sarkar:
Vulnerability of Nonlinear Filter Generators Based on Linear Finite State Machines. 193-209 - Bartosz Zoltak:
VMPC One-Way Function and Stream Cipher. 210-225 - Hongjun Wu:
A New Stream Cipher HC-256. 226-244 - Souradyuti Paul, Bart Preneel:
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher. 245-259 - Taizo Shirai, Kyoji Shibutani:
Improving Immunity of Feistel Ciphers against Differential Cryptanalysis by Using Multiple MDS Matrices. 260-278 - François-Xavier Standaert, Gilles Piret, Gaël Rouvroy, Jean-Jacques Quisquater, Jean-Didier Legat:
ICEBERG : An Involutional Cipher Efficient for Block Encryption in Reconfigurable Hardware. 279-299 - Youngdai Ko, Seokhie Hong, Wonil Lee, Sangjin Lee, Ju-Sung Kang:
Related Key Differential Attacks on 27 Rounds of XTEA and Full-Round GOST. 299-316 - Helger Lipmaa, Johan Wallén, Philippe Dumas:
On the Additive Differential Probability of Exclusive-Or. 317-331 - Mehdi-Laurent Akkar, Régis Bevan, Louis Goubin:
Two Power Analysis Attacks against One-Mask Methods. 332-347 - Phillip Rogaway:
Nonce-Based Symmetric Encryption. 348-359 - Stefan Lucks:
Ciphers Secure against Related-Key Attacks. 359-370 - Phillip Rogaway, Thomas Shrimpton:
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. 371-388 - Mihir Bellare, Phillip Rogaway, David A. Wagner:
The EAX Mode of Operation. 389-407 - Tadayoshi Kohno, John Viega, Doug Whiting:
CWC: A High-Performance Conventional Authenticated Encryption Mode. 408-426 - Tetsu Iwata, Tadayoshi Kohno:
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. 427-445 - Simon R. Blackburn, Kenneth G. Paterson:
Cryptanalysis of a Message Authentication Code due to Cary and Venkatesan. 446-453 - Scott Contini, Yiqun Lisa Yin:
Fast Software-Based Attacks on SecurID. 454-471 - Dai Watanabe, Soichi Furuya:
A MAC Forgery Attack on SOBER-128. 472-482 - Alexander Maximov:
On Linear Approximation of Modulo Sum. 483-484
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.