Designs, Codes and Cryptography
Linear Frameworks for Block Ciphers
Designs, Codes and Cryptography
Strengthening the Key Schedule of the AES
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
SAC '98 Proceedings of the Selected Areas in Cryptography
Efficient Evaluation of Security against Generalized Interpolation Attack
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis
SAC '00 Proceedings of the 7th Annual International Workshop on Selected Areas in Cryptography
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
In How Many Ways Can You Write Rijndael?
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Recent Developments in the Design of Conventional Cryptographic Algorithms
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
State of the Art in Applied Cryptography, Course on Computer Security and Industrial Cryptography - Revised Lectures
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Security of Camellia against Truncated Differential Cryptanalysis
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Improved SQUARE Attacks against Reduced-Round HIEROCRYPT
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Interpolation Attacks of the Block Cipher: SNAKE
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Multi-objective optimisation of bijective S-boxes
New Generation Computing - Evolutionary computation
Accelerated AES implementations via generalized instruction set extensions
Journal of Computer Security - The Third IEEE International Symposium on Security in Networks and Distributed Systems
PRESENT: An Ultra-Lightweight Block Cipher
CHES '07 Proceedings of the 9th international workshop on Cryptographic Hardware and Embedded Systems
New Applications of Differential Bounds of the SDS Structure
ISC '08 Proceedings of the 11th international conference on Information Security
3D: A Three-Dimensional Block Cipher
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
MIBS: A New Lightweight Block Cipher
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Hardware design and analysis of block cipher components
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Simple identity-based cryptography with mediated RSA
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
A scalable block cipher design using filter banks and lifting over finite fields
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Revisiting the security of the ALRED design
ISC'10 Proceedings of the 13th international conference on Information security
On unbalanced Feistel networks with contracting MDS diffusion
Designs, Codes and Cryptography
On feistel structures using a diffusion switching mechanism
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
General principles of algebraic attacks and new design criteria for cipher components
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
The inverse s-box, non-linear polynomial relations and cryptanalysis of block ciphers
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
Parallelizing the camellia and SMS4 block ciphers
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
Narrow-Bicliques: cryptanalysis of full IDEA
EUROCRYPT'12 Proceedings of the 31st Annual international conference on Theory and Applications of Cryptographic Techniques
A new method to determine algebraic expression of power mapping based S-boxes
Information Processing Letters
Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4
International Journal of Applied Cryptography
Hi-index | 0.00 |