-
1Published 2002Table of Contents: “…Block Cipher Cryptanalysis -- New Results on Boomerang and Rectangle Attacks -- Multiplicative…”
Full Text via HEAL-Link
Electronic eBook -
2Published 1997Table of Contents: “… of Ladder-DES -- A family of trapdoor ciphers -- The block cipher Square -- XMX: A firmware-oriented block…”
Full Text via HEAL-Link
Electronic eBook -
3Published 2002Table of Contents: “… Ciphers II -- Improved Square Attacks against Reduced-Round Hierocrypt -- Differential Cryptanalysis of Q…”
Full Text via HEAL-Link
Electronic eBook -
4Published 2001Table of Contents: “… of Cryptographic Parity Circuits" Proposed at ISW'97 -- Block Ciphers - New Designs -- Camellia: A 128-Bit Block…”
Full Text via HEAL-Link
Electronic eBook -
5Published 2003Table of Contents: “… of the Stream Cipher SNOW -- Encryption Schemes -- Encryption-Scheme Security in the Presence of Key-Dependent…”
Full Text via HEAL-Link
Electronic eBook -
6Published 2009Table of Contents: “… Grøstl Compression Function, ECHO Permutation and AES Block Cipher -- Cryptanalyses of Narrow-Pipe Mode…”
Full Text via HEAL-Link
Electronic eBook -
7Published 2008Table of Contents: “… -- Block Cipher -- Improved and Multiple Linear Cryptanalysis of Reduced Round Serpent -- Linear Slide…”
Full Text via HEAL-Link
Electronic eBook -
8Published 2009Table of Contents: “… of Cryptographic Pairings -- Block Ciphers I -- The Cryptanalysis of Reduced-Round SMS4 -- Building Secure Block…”
Full Text via HEAL-Link
Electronic eBook -
9Published 2006Table of Contents: “… Ciphers -- Hash Functions – I -- Improved Collision Attack on the Hash Function Proposed at PKC’98…”
Full Text via HEAL-Link
Electronic eBook -
10Published 2016Table of Contents: “… Research Together at Cipher5 -- Introduction -- Multi-Dimensional Cartography of Aesthetic Systems…”
Full Text via HEAL-Link
Electronic eBook -
11Published 2007Table of Contents: “… Equivalents of Frobenius Expansions -- Another Look at Square Roots (and Other Less Common Operations…”
Full Text via HEAL-Link
Electronic eBook -
12Published 2009Table of Contents: “…Block Ciphers -- Related-Key Cryptanalysis of the Full AES-192 and AES-256 -- The Key-Dependent…”
Full Text via HEAL-Link
Electronic eBook -
13Published 1997Table of Contents: “… on block cipher -- New lower bounds on nonlinearity and a class of highly nonlinear functions…”
Full Text via HEAL-Link
Electronic eBook -
14Published 2008Table of Contents: “… -- Computational Soundness of Non-Malleable Commitments -- Square Attack on Reduced-Round Zodiac Cipher -- Analysis…”
Full Text via HEAL-Link
Electronic eBook -
15Published 2007Table of Contents: “… Computation of DNF -- Cryptanalysis -- Square Like Attack on Camellia -- Differential Fault Analysis on CLEFIA…”
Full Text via HEAL-Link
Electronic eBook -
16Published 2009Table of Contents: “… the Block Cipher PRESENT -- Practical Attacks on Masked Hardware -- Cryptanalysis of CTC2 -- Alternative…”
Full Text via HEAL-Link
Electronic eBook -
17Published 2003Table of Contents: “… Functions Based on Block-Cipher -- Square Hash with a Small Key Size.…”
Full Text via HEAL-Link
Electronic eBook -
18Published 2006Table of Contents: “… with Techniques from Block Cipher Cryptanalysis -- Power Analysis to ECC Using Differential Power Between…”
Full Text via HEAL-Link
Electronic eBook -
19Published 2010Table of Contents: “… of Options by Two Approaches -- Improved Substitution-Diffusion Based Image Cipher Using Chaotic Standard Map…”
Full Text via HEAL-Link
Electronic eBook -
20Published 2001Table of Contents: “… Multiple Digital Signatures -- Square Attack on Reduced Camellia Cipher -- Generalization of Elliptic Curve…”
Full Text via HEAL-Link
Electronic eBook