No. Title Author Year
1 09031 Abstracts Collection -- Symmetric Cryptography Handschuh, Helena et al. 2009
2 09031 Executive Summary -- Symmetric Cryptography Handschuh, Helena et al. 2009
3 Algebraic Attacks against Linear RFID Authentication Protocols Krause, Matthias et al. 2009
4 Cache Timing Analysis of eStream Finalists Zenner, Erik 2009
5 Classification of the SHA-3 Candidates Fleischmann, Ewan et al. 2009
6 Cube Testers and Key Recovery Attacks On Reduced-Round MD6 and Trivium Aumasson, Jean-Philippe et al. 2009
7 Gr°stl - a SHA-3 candidate Gauravaram, Praveen et al. 2009
8 Internal collision attack on Maraca Canteaut, Anne et al. 2009
9 Mini-ciphers: a reliable testbed for cryptanalysis? Nakahara, Jorge et al. 2009
10 MutantXL: Solving Multivariate Polynomial Equations for Cryptanalysis Buchmann, Johannes A. et al. 2009
11 Parallel Generation of l-Sequences R÷ck, Andrea et al. 2009
12 Practical Collisions for EnRUPT Indesteege, Sebastiaan et al. 2009
13 Practical Preimages for Maraca Indesteege, Sebastiaan et al. 2009
14 Statistical Tests for Key Recovery Using Multidimensional Extension of Matsui's Algorithm 1 Hermelin, Miia et al. 2009
15 Sufficient conditions for sound tree hashing modes Bertoni, Guido et al. 2009
16 The Lane hash function Indesteege, Sebastiaan et al. 2009
17 The Road from Panama to Keccak via RadioGat˙n Bertoni, Guido et al. 2009
18 The SHAvite-3 - A New Hash Function Dunkelman, Orr et al. 2009
Current Page :
Number of result pages: 1
Number of documents: 18


DROPS-Home | Fulltext Search | Imprint Published by LZI