Sciweavers

1769 search results - page 7 / 354
» Cryptography
Sort
View
TCC
2010
Springer
140views Cryptology» more  TCC 2010»
15 years 4 months ago
Robust Encryption
Michel Abdalla, Mihir Bellare, Gregory Neven
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
15 years 4 months ago
Meet-in-the-Middle Attacks on SHA-3 Candidates
Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp W...
FSE
2009
Springer
148views Cryptology» more  FSE 2009»
15 years 4 months ago
Revisiting the IDEA Philosophy
Pascal Junod, Marco Macchetti
FSE
2009
Springer
143views Cryptology» more  FSE 2009»
15 years 4 months ago
New Distinguishing Attack on MAC Using Secret-Prefix Method
Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang
ACNS
2009
Springer
114views Cryptology» more  ACNS 2009»
15 years 4 months ago
Broadcast Attacks against Lattice-Based Cryptosystems
Thomas Plantard, Willy Susilo