Public quadratic polynomial-tuples for efficient signature-verification and message-encryption
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Nonlinearity criteria for cryptographic functions
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
Markov ciphers and differential cryptanalysis
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
On the construction of highly nonlinear permutations
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Systematic generation of cryptographically robust S-boxes
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
Differentially uniform mappings for cryptography
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
On almost perfect nonlinear permutations
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Constructing Symmetric Ciphers Using the CAST Design Procedure
Designs, Codes and Cryptography - Special issue: selected areas in cryptography I
Constructions of Cheating Immune Secret Sharing
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Toward Provable Security of Substitution-Permutation Encryption Networks
SAC '98 Proceedings of the Selected Areas in Cryptography
Controlled Operations as a Cryptographic Primitive
MMM-ACNS '01 Proceedings of the International Workshop on Information Assurance in Computer Networks: Methods, Models, and Architectures for Network Security
Pitfalls in Designing Substitution Boxes (Extended Abstract)
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Cryptographic Functions and Design Criteria for Block Ciphers
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Cheating Prevention in Secret Sharing over GF(pt)
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
A New Characterization of Almost Bent Functions
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Algorithms for Information Conversion Based on Controlled Two-Place Operations
Cybernetics and Systems Analysis
Multi-objective optimisation of bijective S-boxes
New Generation Computing - Evolutionary computation
The design of composite permutations with applications to DES-like S-boxes
Designs, Codes and Cryptography
On 3-to-1 and Power APN S-Boxes
SETA '08 Proceedings of the 5th international conference on Sequences and Their Applications
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Resistance against general iterated attacks
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
On the differential and linear efficiency of balanced Feistel networks
Information Processing Letters
Proposition of two cipher structures
Inscrypt'09 Proceedings of the 5th international conference on Information security and cryptology
On maximum differential probability of generalized Feistel
ACISP'11 Proceedings of the 16th Australasian conference on Information security and privacy
A complete formulation of generalized affine equivalence
ICTCS'05 Proceedings of the 9th Italian conference on Theoretical Computer Science
New methods to construct cheating immune multisecret sharing scheme
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
A new criterion for nonlinearity of block ciphers
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
On feistel structures using a diffusion switching mechanism
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
On exact algebraic [non-]immunity of s-boxes based on power functions
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
Hi-index | 0.00 |