Sciweavers

2967 search results - page 88 / 594
» Cryptology
Sort
View
CRYPTO
2009
Springer
106views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
New Birthday Attacks on Some MACs Based on Block Ciphers
Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiao...
CRYPTO
2009
Springer
103views Cryptology» more  CRYPTO 2009»
15 years 11 months ago
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures
Jean-Sébastien Coron, David Naccache, Mehdi...
109
Voted
CTRSA
2007
Springer
101views Cryptology» more  CTRSA 2007»
15 years 11 months ago
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers
Nathan Keller, Stephen D. Miller, Ilya Mironov, Ra...
95
Voted
ASIACRYPT
2005
Springer
15 years 10 months ago
A Simple Threshold Authenticated Key Exchange from Short Secrets
Michel Abdalla, Olivier Chevassut, Pierre-Alain Fo...
87
Voted
ASIACRYPT
2005
Springer
15 years 10 months ago
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...