Sciweavers

2967 search results - page 31 / 594
» Cryptology
Sort
View
FSE
2010
Springer
147views Cryptology» more  FSE 2010»
15 years 2 months ago
Security Analysis of the Mode of JH Hash Function
Rishiraj Bhattacharyya, Avradip Mandal, Mridul Nan...
FSE
2010
Springer
124views Cryptology» more  FSE 2010»
15 years 2 months ago
Enhanced Security Notions for Dedicated-Key Hash Functions: Definitions and Relationships
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
FSE
2010
Springer
121views Cryptology» more  FSE 2010»
15 years 2 months ago
Nonlinear Equivalence of Stream Ciphers
Sondre Rønjom, Carlos Cid
FSE
2010
Springer
230views Cryptology» more  FSE 2010»
15 years 2 months ago
Lightweight Privacy Preserving Authentication for RFID Using a Stream Cipher
Olivier Billet, Jonathan Etrog, Henri Gilbert
FSE
2010
Springer
153views Cryptology» more  FSE 2010»
15 years 2 months ago
Finding Preimages of Tiger Up to 23 Steps
Lei Wang, Yu Sasaki