language:
Find link is a tool written by Edward Betts.searching for Selected Areas in Cryptography 46 found (71 total)
alternate case: selected Areas in Cryptography
Akelarre (cipher)
(333 words)
[view diff]
exact match in snippet
view article
(PDF/PostScript). Proceedings of SAC'96, Third Annual Workshop on Selected Areas in Cryptography. Queen's University, Kingston, Ontario. pp. 1–14. Niels FergusonDecorrelation theory (398 words) [view diff] exact match in snippet view article find links to article
2007. Retrieved 26 February 2007. Stinson, Douglas (2001). Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000, Waterloo, OntarioWhite-box cryptography (2,480 words) [view diff] exact match in snippet view article find links to article
Security Notions for Symmetric Encryption Schemes. SAC 2013: Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 8282. pp. 247–264.MMB (cipher) (204 words) [view diff] exact match in snippet view article
Sun (2009). "Cryptanalysis of the Full MMB Block Cipher". Selected Areas in Cryptography 2009. Springer-Verlag. pp. 231–248. Archived from the originalORYX (345 words) [view diff] exact match in snippet view article find links to article
Machine "Cryptanalysis of ORYX"], Fifth Annual Workshop on Selected Areas in Cryptography, Springer Verlag, August 1998, to appear. Brief descriptionAlternating step generator (565 words) [view diff] exact match in snippet view article find links to article
"Reduced Complexity Attacks on the Alternating Step Generator". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 4876. Berlin, Heidelberg:A5/1 (2,725 words) [view diff] exact match in snippet view article find links to article
(2005). "Conditional Estimators: An Effective Attack on A5/1". Selected Areas in Cryptography 2005: 1–19. Barkan, Elad; Eli Biham; Nathan Keller (2003). "InstantQUAD (cipher) (868 words) [view diff] exact match in snippet view article
Multivariate Quadratic Systems (PDF). International Workshop on Selected Areas in Cryptography - SAC 2006. doi:10.1007/978-3-540-74462-7_13. Retrieved 2008-03-18VMAC (742 words) [view diff] exact match in snippet view article find links to article
(2007). "Message Authentication on 64-Bit Architectures" (PDF). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 4356. Springer-VerlagPC1 cipher (182 words) [view diff] exact match in snippet view article find links to article
“Kindle” Cipher'. [1] [2] [3] 2012. Lars R. Knudsen, Huapeng Wu. "Selected Areas in Cryptography" 2012. p. 86. "PC3 encryption cipher". Alexander Pukall WebSNOW (699 words) [view diff] exact match in snippet view article find links to article
(August 2002). A New Version of the Stream Cipher SNOW (PDF). Selected Areas in Cryptography: 9th Annual International Workshop. St. John's, NewfoundlandCCM mode (934 words) [view diff] exact match in snippet view article find links to article
Jonsson, Jakob (2003). "On the Security of CTR + CBC-MAC" (PDF). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 2595. pp. 76–93. doi:10MD2 (hash function) (1,053 words) [view diff] exact match in snippet view article
1995). The Compression Function of MD2 is not Collision Free. Selected Areas in Cryptography (SAC) 1995, Ottawa, Canada (workshop record). Rogier, N.; ChauvaudElliptic curve point multiplication (4,325 words) [view diff] exact match in snippet view article find links to article
Selected Areas in Cryptography – SAC 2015. Lecture Notes in Computer Science. Vol. 9566. In Orr Dunkelman and Liam Keliher, editors, Selected Areas inAnne Canteaut (513 words) [view diff] exact match in snippet view article find links to article
In Biryukov, Alex; Gong, Guang; Stinson, Douglas R. (eds.). Selected Areas in Cryptography - 17th International Workshop, SAC 2010, Waterloo, Ontario,SMASH (hash) (314 words) [view diff] exact match in snippet view article
"Breaking a New Hash Function Design Strategy Called SMASH". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3897. pp. 233–244.Weak key (1,302 words) [view diff] exact match in snippet view article find links to article
the key scheduling algorithm of RC4 Eighth Annual Workshop on Selected Areas in Cryptography (August 2001), http://citeseer.ist.psu.edu/fluhrer01weaknessesThreshold cryptosystem (868 words) [view diff] exact match in snippet view article find links to article
Dunkelman, Orr; Jacobson, Michael J. Jr.; O'Flynn, Colin (eds.). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 12804. Cham: SpringerBart Preneel (975 words) [view diff] exact match in snippet view article find links to article
Function". In Matsui, Mitsuru; Zuccherato, Robert J. (eds.). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3006. Berlin, Heidelberg:SipHash (1,342 words) [view diff] exact match in snippet view article find links to article
(29 November 2014). "Differential Cryptanalysis of SipHash". Selected Areas in Cryptography -- SAC 2014. Lecture Notes in Computer Science. Vol. 8781. ppDiffie–Hellman problem (954 words) [view diff] exact match in snippet view article find links to article
(2003). "The Group Diffie-Hellman Problems" (PDF). SAC 2002: Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 2595. Springer. ppIndex calculus algorithm (1,720 words) [view diff] exact match in snippet view article find links to article
) {\displaystyle L(1/4+o(1))} in very small characteristic. Selected Areas in Cryptography—SAC 2013. Lecture Notes in Computer Science. Vol. 8282. BurnabyMerkle tree (1,804 words) [view diff] exact match in snippet view article find links to article
Preimage and Trojan Message Attacks beyond Merkle-Damgård". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 5867. SAC. pp. 393–414International Data Encryption Algorithm (1,499 words) [view diff] exact match in snippet view article find links to article
"A New Meet-in-the-Middle Attack on the IDEA Block Cipher". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3006. pp. 117–129.SWAR (2,135 words) [view diff] exact match in snippet view article find links to article
Software Parallel Implementation of Cryptographic Pairings". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 5381. pp. 35–50. doi:10Initialization vector (1,797 words) [view diff] exact match in snippet view article find links to article
Multiple Data". In Preneel, Bart; Tavares, Stafford E. (eds.). Selected Areas in Cryptography, 12th International Workshop, SAC 2005, Kingston, ON, CanadaBlock cipher (6,569 words) [view diff] case mismatch in snippet view article find links to article
Substitution–Permutation Networks". In Hays, Howard; Carlisle, Adam (eds.). Selected areas in cryptography: 6th annual international workshop, SAC'99, Kingston, OntarioMQV (1,743 words) [view diff] exact match in snippet view article find links to article
protocols providing implicit authentication (PDF). 2nd Workshop on Selected Areas in Cryptography (SAC '95). Ottawa, Canada. pp. 22–32. Hankerson, D.; VanstoneCryptographically secure pseudorandom number generator (3,633 words) [view diff] exact match in snippet view article find links to article
Pseudorandom Number Generator" (PDF). Sixth Annual Workshop on Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 1758. pp. 13–33. doi:10RadioGatún (1,559 words) [view diff] exact match in snippet view article find links to article
Collision Resistance of Radio Gatún Using Algebraic Techniques". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 5381. pp. 245–261.Yarrow algorithm (1,494 words) [view diff] exact match in snippet view article find links to article
Pseudorandom Number Generator" (PDF). Sixth Annual Workshop on Selected Areas in Cryptography. 1758: 13–33. doi:10.1007/3-540-46513-8_2. "An implementationT-function (713 words) [view diff] exact match in snippet view article find links to article
Shamir, Adi (2003). "Cryptographic Applications of T-Functions". Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 3006. Springer-VerlagPALISADE (software) (946 words) [view diff] exact match in snippet view article
Approximate Homomorphic Encryption". Cid C., Jacobson Jr. M. (eds) Selected Areas in Cryptography – SAC 2018. SAC 2018. Springer, Cham. pp. 347–368. doi:10Entropy (information theory) (10,220 words) [view diff] exact match in snippet view article
December 2013. Pliam, John (1999). "Selected Areas in Cryptography". International Workshop on Selected Areas in Cryptography. Lecture Notes in Computer ScienceProvable security (2,181 words) [view diff] exact match in snippet view article find links to article
Security of the Extended Codebook (XCB) Mode of Operation", Selected Areas in Cryptography, Lecture Notes in Computer Science, vol. 4876, pp. 311–327,OpenFHE (1,018 words) [view diff] exact match in snippet view article find links to article
Approximate Homomorphic Encryption". Cid C., Jacobson Jr. M. (eds) Selected Areas in Cryptography – SAC 2018. SAC 2018. Springer, Cham. pp. 347–368. doi:10Serge Vaudenay (813 words) [view diff] exact match in snippet view article find links to article
Pascal; Vaudenay, Serge, "FOX : A New Family of Block Ciphers", Selected Areas in Cryptography (PDF), Lecture Notes in Computer Science, vol. 3357, Springer-VerlagAdvanced Encryption Standard (5,679 words) [view diff] exact match in snippet view article find links to article
simple algebraic representation of Rijndael". Proceedings of Selected Areas in Cryptography, 2001, Lecture Notes in Computer Science. Springer-Verlag. ppWi-Fi Protected Access (4,677 words) [view diff] exact match in snippet view article find links to article
Jonsson, Jakob (2003). "On the Security of CTR + CBC-MAC" (PDF). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 2595. pp. 76–93. doi:10PURB (cryptography) (1,495 words) [view diff] exact match in snippet view article
Tibouchi, Mehdi; Zapalowicz, Jean-Christophe (August 2014). Binary Elligator Squared (PDF). International Conference on Selected Areas in Cryptography.Infrastructure (number theory) (2,490 words) [view diff] case mismatch in snippet view article
based on real quadratic number fields (extended abstract). Selected areas in cryptography (Waterloo, ON, 2000), 288–302, Lecture Notes in Comput. SciCryptography (11,007 words) [view diff] exact match in snippet view article find links to article
Junod, Pascal (2001). "On the Complexity of Matsui's Attack". Selected Areas in Cryptography (PDF). Lecture Notes in Computer Science. Vol. 2259. pp. 199–211Bluetooth (14,078 words) [view diff] exact match in snippet view article find links to article
Bluetooth Pairing – the Fixed Coordinate Invalid Curve Attack". Selected Areas in Cryptography – SAC 2019. Lecture Notes in Computer Science. Vol. 11959. TechnionDisk encryption theory (3,772 words) [view diff] exact match in snippet view article find links to article
(2007). "Improved Security Analysis of XEX and LRW Modes" (PDF). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 4356. pp. 96–113. doi:10Transport Layer Security (17,519 words) [view diff] exact match in snippet view article find links to article
RC4". In Alex Biryukov; Guang Gong; Douglas R. Stinson (eds.). Selected Areas in Cryptography: 17th International Workshop, SAC 2010, Waterloo, Ontario, CanadaAircrack-ng (5,018 words) [view diff] exact match in snippet view article find links to article
RC4". In Adams, Carlisle; Miri, Ali; Wiener, Michael (eds.). Selected Areas in Cryptography. Lecture Notes in Computer Science. Vol. 4876. Berlin, Heidelberg: