language:
Find link is a tool written by Edward Betts.searching for Selected Areas in Cryptography 46 found (71 total)
alternate case: selected Areas in Cryptography
Akelarre (cipher)
(333 words)
[view diff]
exact match in snippet
view article
(PDF/PostScript). Proceedings of SAC'96, Third Annual Workshop on Selected Areas in Cryptography. Queen's University, Kingston, Ontario. pp. 1–14. Niels FergusonMMB (cipher) (204 words) [view diff] exact match in snippet view article
Sun (2009). "Cryptanalysis of the Full MMB Block Cipher". Selected Areas in Cryptography 2009. Springer-Verlag. pp. 231–248. Archived from the originalDecorrelation theory (398 words) [view diff] exact match in snippet view article find links to article
2007. Retrieved 26 February 2007. Stinson, Douglas (2001). Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000, Waterloo, OntarioWhite-box cryptography (2,480 words) [view diff] exact match in snippet view article find links to article
Security Notions for Symmetric Encryption Schemes. SAC 2013: Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 8282. pp. 247–264.ORYX (345 words) [view diff] exact match in snippet view article find links to article
Machine "Cryptanalysis of ORYX"], Fifth Annual Workshop on Selected Areas in Cryptography, Springer Verlag, August 1998, to appear. Brief descriptionAlternating step generator (565 words) [view diff] exact match in snippet view article find links to article
"Reduced Complexity Attacks on the Alternating Step Generator". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 4876. Berlin, Heidelberg:A5/1 (2,725 words) [view diff] exact match in snippet view article find links to article
(2005). "Conditional Estimators: An Effective Attack on A5/1". Selected Areas in Cryptography 2005: 1–19. Barkan, Elad; Eli Biham; Nathan Keller (2003). "InstantVMAC (742 words) [view diff] exact match in snippet view article find links to article
(2007). "Message Authentication on 64-Bit Architectures" (PDF). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 4356. Springer-VerlagQUAD (cipher) (871 words) [view diff] exact match in snippet view article
Multivariate Quadratic Systems (PDF). International Workshop on Selected Areas in Cryptography - SAC 2006. doi:10.1007/978-3-540-74462-7_13. Retrieved 2008-03-18SNOW (707 words) [view diff] exact match in snippet view article find links to article
(August 2002). A New Version of the Stream Cipher SNOW (PDF). Selected Areas in Cryptography: 9th Annual International Workshop. St. John's, NewfoundlandCCM mode (934 words) [view diff] exact match in snippet view article find links to article
Jonsson, Jakob (2003). "On the Security of CTR + CBC-MAC" (PDF). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 2595. pp. 76–93. doi:10MD2 (hash function) (1,053 words) [view diff] exact match in snippet view article
1995). The Compression Function of MD2 is not Collision Free. Selected Areas in Cryptography (SAC) 1995, Ottawa, Canada (workshop record). Rogier, N.; ChauvaudWeak key (1,302 words) [view diff] exact match in snippet view article find links to article
the key scheduling algorithm of RC4 Eighth Annual Workshop on Selected Areas in Cryptography (August 2001), http://citeseer.ist.psu.edu/fluhrer01weaknessesPC1 cipher (185 words) [view diff] exact match in snippet view article find links to article
[1][permanent dead link] [2] [3] 2012. Lars R. Knudsen, Huapeng Wu. "Selected Areas in Cryptography" 2012. p. 86. "PC3 encryption cipher". Alexander Pukall WebAnne Canteaut (513 words) [view diff] exact match in snippet view article find links to article
In Biryukov, Alex; Gong, Guang; Stinson, Douglas R. (eds.). Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario,SMASH (hash) (314 words) [view diff] exact match in snippet view article
"Breaking a New Hash Function Design Strategy Called SMASH". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3897. pp. 233–244.Threshold cryptosystem (868 words) [view diff] exact match in snippet view article find links to article
Dunkelman, Orr; Jacobson, Michael J. Jr.; O'Flynn, Colin (eds.). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 12804. Cham: SpringerSipHash (1,342 words) [view diff] exact match in snippet view article find links to article
(29 November 2014). "Differential Cryptanalysis of SipHash". Selected Areas in Cryptography -- SAC 2014. Lecture Notes in Computer Science. Vol. 8781. ppBart Preneel (975 words) [view diff] exact match in snippet view article find links to article
Function". In Matsui, Mitsuru; Zuccherato, Robert J. (eds.). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3006. Berlin, Heidelberg:Diffie–Hellman problem (954 words) [view diff] exact match in snippet view article find links to article
(2003). "The Group Diffie-Hellman Problems" (PDF). SAC 2002: Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 2595. Springer. ppMerkle tree (1,787 words) [view diff] exact match in snippet view article find links to article
Preimage and Trojan Message Attacks beyond Merkle-Damgård". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 5867. SAC. pp. 393–414Index calculus algorithm (1,763 words) [view diff] exact match in snippet view article find links to article
) {\displaystyle L(1/4+o(1))} in very small characteristic. Selected Areas in Cryptography—SAC 2013. Lecture Notes in Computer Science. Vol. 8282. BurnabyInternational Data Encryption Algorithm (1,499 words) [view diff] exact match in snippet view article find links to article
"A New Meet-in-the-Middle Attack on the IDEA Block Cipher". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3006. pp. 117–129.Initialization vector (1,797 words) [view diff] exact match in snippet view article find links to article
Multiple Data". In Preneel, Bart; Tavares, Stafford E. (eds.). Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, CanadaSWAR (2,234 words) [view diff] exact match in snippet view article find links to article
Software Parallel Implementation of Cryptographic Pairings". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 5381. pp. 35–50. doi:10Block cipher (6,569 words) [view diff] case mismatch in snippet view article find links to article
Substitution–Permutation Networks". In Hays, Howard; Carlisle, Adam (eds.). Selected areas in cryptography: 6th annual international workshop, SAC'99, Kingston, OntarioMQV (1,743 words) [view diff] exact match in snippet view article find links to article
protocols providing implicit authentication (PDF). 2nd Workshop on Selected Areas in Cryptography (SAC '95). Ottawa, Canada. pp. 22–32. Hankerson, D.; VanstoneCryptographically secure pseudorandom number generator (3,633 words) [view diff] exact match in snippet view article find links to article
Pseudorandom Number Generator" (PDF). Sixth Annual Workshop on Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 1758. pp. 13–33. doi:10RadioGatún (1,559 words) [view diff] exact match in snippet view article find links to article
Collision Resistance of Radio Gatún Using Algebraic Techniques". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 5381. pp. 245–261.Yarrow algorithm (1,502 words) [view diff] exact match in snippet view article find links to article
Pseudorandom Number Generator" (PDF). Sixth Annual Workshop on Selected Areas in Cryptography. 1758: 13–33. doi:10.1007/3-540-46513-8_2. "An implementationT-function (713 words) [view diff] exact match in snippet view article find links to article
Shamir, Adi (2003). "Cryptographic Applications of T-Functions". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3006. Springer-VerlagPALISADE (software) (946 words) [view diff] exact match in snippet view article
Approximate Homomorphic Encryption". Cid C., Jacobson Jr. M. (eds) Selected Areas in Cryptography – SAC 2018. SAC 2018. Springer, Cham. pp. 347–368. doi:10Entropy (information theory) (10,208 words) [view diff] exact match in snippet view article
December 2013. Pliam, John (1999). "Selected Areas in Cryptography". International Workshop on Selected Areas in Cryptography. Lecture Notes in Computer ScienceElliptic curve point multiplication (4,145 words) [view diff] exact match in snippet view article find links to article
X25519 and X448". In Carlisle Adams; Jan Camenisch (eds.). Selected Areas in Cryptography – SAC 2017. Lecture Notes in Computer Science. Vol. 10719. SpringerProvable security (2,181 words) [view diff] exact match in snippet view article find links to article
Security of the Extended Codebook (XCB) Mode of Operation", Selected Areas in Cryptography, Lecture Notes in Computer Science, vol. 4876, pp. 311–327,OpenFHE (1,018 words) [view diff] exact match in snippet view article find links to article
Approximate Homomorphic Encryption". Cid C., Jacobson Jr. M. (eds) Selected Areas in Cryptography – SAC 2018. SAC 2018. Springer, Cham. pp. 347–368. doi:10Wi-Fi Protected Access (4,631 words) [view diff] exact match in snippet view article find links to article
Jonsson, Jakob (2003). "On the Security of CTR + CBC-MAC" (PDF). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 2595. pp. 76–93. doi:10Serge Vaudenay (813 words) [view diff] exact match in snippet view article find links to article
Pascal; Vaudenay, Serge, "FOX : A New Family of Block Ciphers", Selected Areas in Cryptography (PDF), Lecture Notes in Computer Science, vol. 3357, Springer-VerlagAdvanced Encryption Standard (5,679 words) [view diff] exact match in snippet view article find links to article
simple algebraic representation of Rijndael". Proceedings of Selected Areas in Cryptography, 2001, Lecture Notes in Computer Science. Springer-Verlag. ppPURB (cryptography) (1,495 words) [view diff] exact match in snippet view article
Tibouchi, Mehdi; Zapalowicz, Jean-Christophe (August 2014). Binary Elligator Squared (PDF). International Conference on Selected Areas in Cryptography.Infrastructure (number theory) (2,490 words) [view diff] case mismatch in snippet view article
based on real quadratic number fields (extended abstract). Selected areas in cryptography (Waterloo, ON, 2000), 288–302, Lecture Notes in Comput. SciCryptography (11,041 words) [view diff] exact match in snippet view article find links to article
Junod, Pascal (2001). "On the Complexity of Matsui's Attack". Selected Areas in Cryptography (PDF). Lecture Notes in Computer Science. Vol. 2259. pp. 199–211Bluetooth (14,080 words) [view diff] exact match in snippet view article find links to article
Bluetooth Pairing – the Fixed Coordinate Invalid Curve Attack". Selected Areas in Cryptography – SAC 2019. Lecture Notes in Computer Science. Vol. 11959. TechnionDisk encryption theory (3,772 words) [view diff] exact match in snippet view article find links to article
(2007). "Improved Security Analysis of XEX and LRW Modes" (PDF). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 4356. pp. 96–113. doi:10Transport Layer Security (17,586 words) [view diff] exact match in snippet view article find links to article
RC4". In Alex Biryukov; Guang Gong; Douglas R. Stinson (eds.). Selected Areas in Cryptography: 17th International Workshop, SAC 2010, Waterloo, Ontario, CanadaAircrack-ng (4,946 words) [view diff] exact match in snippet view article find links to article
RC4". In Adams, Carlisle; Miri, Ali; Wiener, Michael (eds.). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 4876. Berlin, Heidelberg: