CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures
ICISC '00 Proceedings of the Third International Conference on Information Security and Cryptology
Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
EUROCRYPT '01 Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques: Advances in Cryptology
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Cryptographic Functions and Design Criteria for Block Ciphers
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Lectures on Data Security, Modern Cryptology in Theory and Practice, Summer School, Aarhus, Denmark, July 1998
A Revised Version of Crypton - Crypton V1.0
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Miss in the Middle Attacks on IDEA and Khufu
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
On the Interpolation Attacks on Block Ciphers
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Quadratic Relations for S-Boxes: Their Minimum Representations and Bounds
ISC '01 Proceedings of the 4th International Conference on Information Security
Interpolation Attacks of the Block Cipher: SNAKE
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Root Finding Interpolation Attack
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Designs, Codes and Cryptography
Affine equivalence in the AES round function
Discrete Applied Mathematics
Practical Algebraic Attacks on the Hitag2 Stream Cipher
ISC '09 Proceedings of the 12th International Conference on Information Security
Affine equivalence in the AES round function
Discrete Applied Mathematics
Algebraic cryptanalysis of the data encryption standard
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
General principles of algebraic attacks and new design criteria for cipher components
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
The inverse s-box, non-linear polynomial relations and cryptanalysis of block ciphers
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Algebraic attacks on combiners with memory and several outputs
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
On exact algebraic [non-]immunity of s-boxes based on power functions
ACISP'06 Proceedings of the 11th Australasian conference on Information Security and Privacy
A new method to determine algebraic expression of power mapping based S-boxes
Information Processing Letters
Hi-index | 0.00 |