Sciweavers

34 search results - page 1 / 7
» fse 2006
Sort
View
92
Voted
FSE
2006
Springer
95views Cryptology» more  FSE 2006»
15 years 4 months ago
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations
Kazuhiko Minematsu, Yukiyasu Tsunoo
91
Voted
FSE
2006
Springer
86views Cryptology» more  FSE 2006»
15 years 4 months ago
Upper Bounds on Algebraic Immunity of Boolean Power Functions
Yassir Nawaz, Guang Gong, Kishan Chand Gupta
87
Voted
FSE
2006
Springer
89views Cryptology» more  FSE 2006»
15 years 4 months ago
The Impact of Carries on the Complexity of Collision Attacks on SHA-1
In this article we present a detailed analysis of the impact
Florian Mendel, Norbert Pramstaller, Christian Rec...
70
Voted
FSE
2006
Springer
78views Cryptology» more  FSE 2006»
15 years 4 months ago
A New Dedicated 256-Bit Hash Function: FORK-256
Deukjo Hong, Donghoon Chang, Jaechul Sung, Sangjin...
114
Voted
FSE
2006
Springer
94views Cryptology» more  FSE 2006»
15 years 4 months ago
Resynchronization Attacks on WG and LEX
WG and LEX are two stream ciphers submitted to eStream
Hongjun Wu, Bart Preneel