Sciweavers

1769 search results - page 7 / 354
» Cryptography
Sort
View
124
Voted
TCC
2010
Springer
140views Cryptology» more  TCC 2010»
15 years 12 months ago
Robust Encryption
Michel Abdalla, Mihir Bellare, Gregory Neven
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
15 years 11 months ago
Meet-in-the-Middle Attacks on SHA-3 Candidates
Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp W...
130
Voted
FSE
2009
Springer
148views Cryptology» more  FSE 2009»
15 years 11 months ago
Revisiting the IDEA Philosophy
Pascal Junod, Marco Macchetti
116
Voted
FSE
2009
Springer
143views Cryptology» more  FSE 2009»
15 years 11 months ago
New Distinguishing Attack on MAC Using Secret-Prefix Method
Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang
102
Voted
ACNS
2009
Springer
114views Cryptology» more  ACNS 2009»
15 years 11 months ago
Broadcast Attacks against Lattice-Based Cryptosystems
Thomas Plantard, Willy Susilo