Sciweavers

2967 search results - page 88 / 594
» Cryptology
Sort
View
CRYPTO
2009
Springer
106views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
New Birthday Attacks on Some MACs Based on Block Ciphers
Zheng Yuan, Wei Wang, Keting Jia, Guangwu Xu, Xiao...
CRYPTO
2009
Springer
103views Cryptology» more  CRYPTO 2009»
15 years 4 months ago
Practical Cryptanalysis of iso/iec 9796-2 and emv Signatures
Jean-Sébastien Coron, David Naccache, Mehdi...
CTRSA
2007
Springer
101views Cryptology» more  CTRSA 2007»
15 years 4 months ago
MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers
Nathan Keller, Stephen D. Miller, Ilya Mironov, Ra...
ASIACRYPT
2005
Springer
15 years 3 months ago
A Simple Threshold Authenticated Key Exchange from Short Secrets
Michel Abdalla, Olivier Chevassut, Pierre-Alain Fo...
ASIACRYPT
2005
Springer
15 years 3 months ago
Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchco...