Sciweavers

1769 search results - page 7 / 354
» Cryptography
Sort
View
TCC
2010
Springer
140views Cryptology» more  TCC 2010»
15 years 10 months ago
Robust Encryption
Michel Abdalla, Mihir Bellare, Gregory Neven
FSE
2009
Springer
159views Cryptology» more  FSE 2009»
15 years 10 months ago
Meet-in-the-Middle Attacks on SHA-3 Candidates
Dmitry Khovratovich, Ivica Nikolic, Ralf-Philipp W...
FSE
2009
Springer
148views Cryptology» more  FSE 2009»
15 years 10 months ago
Revisiting the IDEA Philosophy
Pascal Junod, Marco Macchetti
FSE
2009
Springer
143views Cryptology» more  FSE 2009»
15 years 10 months ago
New Distinguishing Attack on MAC Using Secret-Prefix Method
Xiaoyun Wang, Wei Wang, Keting Jia, Meiqin Wang
ACNS
2009
Springer
114views Cryptology» more  ACNS 2009»
15 years 9 months ago
Broadcast Attacks against Lattice-Based Cryptosystems
Thomas Plantard, Willy Susilo