Sciweavers

2967 search results - page 31 / 594
» Cryptology
Sort
View
128
Voted
FSE
2010
Springer
147views Cryptology» more  FSE 2010»
15 years 10 months ago
Security Analysis of the Mode of JH Hash Function
Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nan...
124
Voted
FSE
2010
Springer
124views Cryptology» more  FSE 2010»
15 years 10 months ago
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
106
Voted
FSE
2010
Springer
121views Cryptology» more  FSE 2010»
15 years 10 months ago
Nonlinear Equivalence of Stream Ciphers
Sondre Rønjom, Carlos Cid
FSE
2010
Springer
230views Cryptology» more  FSE 2010»
15 years 10 months ago
Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher
Olivier Billet, Jonathan Etrog, Henri Gilbert
121
Voted
FSE
2010
Springer
153views Cryptology» more  FSE 2010»
15 years 10 months ago
Finding Preimages of Tiger Up to 23 Steps
Lei Wang, Yu Sasaki