Parallel collision search with application to hash functions and discrete logarithms
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Expected deadlock time in a multiprocessing system
Journal of the ACM (JACM)
Uniform asymptotics of some Abel sums arising in coding theory
Theoretical Computer Science
The Statistics of Simulating Chaos
Statistics and Computing
A Switching Closure Test to Analyze Cryptosystems
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
On the Security of Double and 2-Key Triple Modes of Operation
FSE '99 Proceedings of the 6th International Workshop on Fast Software Encryption
Key Establishment in Large Dynamic Groups Using One-Way Function Trees
IEEE Transactions on Software Engineering
Analysis of a randomized rendezvous algorithm
Information and Computation
Mappings on Decomposable Combinatorial Structures: Analytic Approach
Combinatorics, Probability and Computing
Combinatorics, Probability and Computing
Combinatorics, Probability and Computing
Boltzmann Samplers for the Random Generation of Combinatorial Structures
Combinatorics, Probability and Computing
Generic Groups, Collision Resistance, and ECDSA
Designs, Codes and Cryptography
Cycles in random k-ary maps and the poor performance of random number generation
Journal of Algorithms
Moderately hard, memory-bound functions
ACM Transactions on Internet Technology (TOIT)
Exact distribution of individual displacements in linear probing hashing
ACM Transactions on Algorithms (TALG)
Random mappings with exchangeable in-degrees
Random Structures & Algorithms
Note: Efficient computation of the iteration of functions
Theoretical Computer Science
Success probability of the Hellman trade-off
Information Processing Letters
Period lengths of chaotic pseudo-random number generators
CNIS '07 Proceedings of the Fourth IASTED International Conference on Communication, Network and Information Security
Improved Generic Algorithms for 3-Collisions
ASIACRYPT '09 Proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Linear statistical weakness of alleged RC4 keystream generator
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Dynamical systems generated by rational functions
AAECC'03 Proceedings of the 15th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Stream ciphers using a random update function: study of the entropy of the inner state
AFRICACRYPT'08 Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology
The cost of false alarms in Hellman and rainbow tradeoffs
Designs, Codes and Cryptography
On the Implementation of Huge Random Objects
SIAM Journal on Computing
Pseudorandomness and Dynamics of Fermat Quotients
SIAM Journal on Discrete Mathematics
TMD-Tradeoff and state entropy loss considerations of streamcipher MICKEY
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Towards a general RC4-Like keystream generator
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Design and analysis of password-based key derivation functions
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
A precise analysis of Cuckoo hashing
ACM Transactions on Algorithms (TALG)
Cryptography and Security
Fast and small nonlinear pseudorandom number generators for computer simulation
PPAM'11 Proceedings of the 9th international conference on Parallel Processing and Applied Mathematics - Volume Part I
Random mappings with restricted preimages
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
Memoryless near-collisions, revisited
Information Processing Letters
Scaling laws of associative memory retrieval
Neural Computation
Hi-index | 0.00 |