BibTeX records: Philip S. Vejre

download as .bib file

@article{DBLP:journals/tosc/BogdanovTV18,
  author    = {Andrey Bogdanov and
               Elmar Tischhauser and
               Philip S. Vejre},
  title     = {Multivariate Profiling of Hulls for Linear Cryptanalysis},
  journal   = {{IACR} Trans. Symmetric Cryptol.},
  volume    = {2018},
  number    = {1},
  pages     = {101--125},
  year      = {2018},
  url       = {https://doi.org/10.13154/tosc.v2018.i1.101-125},
  doi       = {10.13154/tosc.v2018.i1.101-125},
  timestamp = {Tue, 13 Mar 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/tosc/BogdanovTV18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Hall-AndersenV18,
  author    = {Mathias Hall{-}Andersen and
               Philip S. Vejre},
  title     = {Generating Graphs Packed with Paths},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {764},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/764},
  timestamp = {Wed, 12 Sep 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/Hall-AndersenV18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovRVW18,
  author    = {Andrey Bogdanov and
               Matthieu Rivain and
               Philip S. Vejre and
               Junwei Wang},
  title     = {Higher-Order {DCA} against Standard Side-Channel Countermeasures},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2018},
  pages     = {869},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/869},
  timestamp = {Wed, 17 Oct 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BogdanovRVW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BogdanovV17,
  author    = {Andrey Bogdanov and
               Philip S. Vejre},
  title     = {Linear Cryptanalysis of {DES} with Asymmetries},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  pages     = {187--216},
  year      = {2017},
  crossref  = {DBLP:conf/asiacrypt/2017-1},
  url       = {https://doi.org/10.1007/978-3-319-70694-8\_7},
  doi       = {10.1007/978-3-319-70694-8\_7},
  timestamp = {Sat, 24 Nov 2018 11:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/BogdanovV17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovV17,
  author    = {Andrey Bogdanov and
               Philip S. Vejre},
  title     = {Linear Cryptanalysis of {DES} with Asymmetries},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2017},
  pages     = {895},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/895},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BogdanovV17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BogdanovTV16,
  author    = {Andrey Bogdanov and
               Elmar Tischhauser and
               Philip S. Vejre},
  title     = {Multivariate Linear Cryptanalysis: The Past and Future of {PRESENT}},
  journal   = {{IACR} Cryptology ePrint Archive},
  volume    = {2016},
  pages     = {667},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/667},
  timestamp = {Tue, 14 Aug 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iacr/BogdanovTV16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/VejreB14,
  author    = {Philip S. Vejre and
               Andrey Bogdanov},
  title     = {Route 66: Passively Breaking All {GSM} Channels},
  booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
               2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  pages     = {422--429},
  year      = {2014},
  crossref  = {DBLP:conf/acisp/2014},
  url       = {https://doi.org/10.1007/978-3-319-08344-5\_28},
  doi       = {10.1007/978-3-319-08344-5\_28},
  timestamp = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/VejreB14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2017-1,
  editor    = {Tsuyoshi Takagi and
               Thomas Peyrin},
  title     = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10624},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70694-8},
  doi       = {10.1007/978-3-319-70694-8},
  isbn      = {978-3-319-70693-1},
  timestamp = {Sat, 24 Nov 2018 11:59:32 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/asiacrypt/2017-1},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2014,
  editor    = {Willy Susilo and
               Yi Mu},
  title     = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
               2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8544},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-08344-5},
  doi       = {10.1007/978-3-319-08344-5},
  isbn      = {978-3-319-08343-8},
  timestamp = {Mon, 17 Sep 2018 09:57:31 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/acisp/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier