Cryptography, a Primer
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
The FEAL–8 cryptosystem and a call for attack
CRYPTO '89 Proceedings on Advances in cryptology
On the distribution of characteristics in bijective mappings
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
New types of cryptanalytic attacks using related keys
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
Differential Cryptanalysis of DES-like Cryptosystems
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
A Known Plaintext Attack of FEAL-4 and FEAL-6
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
On the Design of SP Networks From an Information Theoretic Point of View
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
On the Distribution of Characteristics in Composite Permutations
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Differtial Cryptanalysis of Lucifer
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Linear Cryptanalysis Using Multiple Approximations
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Key-Schedule Cryptoanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
Recent Developments in the Design of Conventional Cryptographic Algorithms
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
FPL '02 Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications
Impossible Differential Cryptanalysis of Zodiac
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Ciphertext Only Attack for One-way Function of the MAP Using One Ciphertext
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Information Sciences: an International Journal
Crypto topics and applications II
Algorithms and theory of computation handbook
A scalable multicast security protocol in hierarchy structures
ACOS'06 Proceedings of the 5th WSEAS international conference on Applied computer science
New combined attacks on block ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
UNAF: a special set of additive differences with application to the differential analysis of ARX
FSE'12 Proceedings of the 19th international conference on Fast Software Encryption
CoARX: a coprocessor for ARX-based cryptographic algorithms
Proceedings of the 50th Annual Design Automation Conference
Hi-index | 0.00 |