Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/sacrypt/sacrypt2008.bht:"
@proceedings{DBLP:conf/sacrypt/2008, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04159-4}, doi = {10.1007/978-3-642-04159-4}, isbn = {978-3-642-04158-7}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/AmielFTWM08, author = {Fr{\'{e}}d{\'{e}}ric Amiel and Benoit Feix and Michael Tunstall and Claire Whelan and William P. Marnane}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Distinguishing Multiplications from Squaring Operations}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {346--360}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_22}, doi = {10.1007/978-3-642-04159-4\_22}, timestamp = {Thu, 07 Sep 2023 13:44:11 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/AmielFTWM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/AndreevaP08, author = {Elena Andreeva and Bart Preneel}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {A Three-Property-Secure Hash Function}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {228--244}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_15}, doi = {10.1007/978-3-642-04159-4\_15}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/AndreevaP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/AokiS08, author = {Kazumaro Aoki and Yu Sasaki}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Preimage Attacks on One-Block MD4, 63-Step {MD5} and More}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {103--119}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_7}, doi = {10.1007/978-3-642-04159-4\_7}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/AokiS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/AumassonMM08, author = {Jean{-}Philippe Aumasson and Willi Meier and Florian Mendel}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Preimage Attacks on 3-Pass {HAVAL} and Step-Reduced {MD5}}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {120--135}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_8}, doi = {10.1007/978-3-642-04159-4\_8}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/AumassonMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BerbainGJ08, author = {C{\^{o}}me Berbain and Henri Gilbert and Antoine Joux}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {184--198}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_12}, doi = {10.1007/978-3-642-04159-4\_12}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BerbainGJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BirknerT08, author = {Peter Birkner and Nicolas Th{\'{e}}riault}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Faster Halvings in Genus 2}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {1--17}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_1}, doi = {10.1007/978-3-642-04159-4\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BirknerT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BouillaguetF08, author = {Charles Bouillaguet and Pierre{-}Alain Fouque}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Analysis of the Collision Resistance of RadioGat{\'{u}}nUsing Algebraic Techniques}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {245--261}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_16}, doi = {10.1007/978-3-642-04159-4\_16}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/BouillaguetF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/EtrogR08, author = {Jonathan Etrog and Matthew J. B. Robshaw}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {The Cryptanalysis of Reduced-Round {SMS4}}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {51--65}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_4}, doi = {10.1007/978-3-642-04159-4\_4}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/EtrogR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/FanBV08, author = {Junfeng Fan and Lejla Batina and Ingrid Verbauwhede}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {{HECC} Goes Embedded: An Area-Efficient Implementation of {HECC}}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {387--400}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_25}, doi = {10.1007/978-3-642-04159-4\_25}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/FanBV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/FanGJ08, author = {Xinxin Fan and Guang Gong and David Jao}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {18--34}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_2}, doi = {10.1007/978-3-642-04159-4\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/FanGJ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/FouqueSZ08, author = {Pierre{-}Alain Fouque and Jacques Stern and S{\'{e}}bastien Zimmer}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Cryptanalysis of Tweaked Versions of {SMASH} and Reparation}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {136--150}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_9}, doi = {10.1007/978-3-642-04159-4\_9}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/FouqueSZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/GrabherGP08, author = {Philipp Grabher and Johann Gro{\ss}sch{\"{a}}dl and Dan Page}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {On Software Parallel Implementation of Cryptographic Pairings}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {35--50}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_3}, doi = {10.1007/978-3-642-04159-4\_3}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/GrabherGP08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HeidarvandV08, author = {Somayeh Heidarvand and Jorge L. Villar}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Public Verifiability from Pairings in Secret Sharing Schemes}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {294--308}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_19}, doi = {10.1007/978-3-642-04159-4\_19}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/HeidarvandV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HeinWF08, author = {Daniel M. Hein and Johannes Wolkerstorfer and Norbert Felber}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {{ECC} Is Ready for {RFID} - {A} Proof in Silicon}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {401--413}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_26}, doi = {10.1007/978-3-642-04159-4\_26}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/HeinWF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HiroseK08, author = {Shoichi Hirose and Hidenori Kuwakado}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {A Scheme to Base a Hash Function on a Block Cipher}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {262--275}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_17}, doi = {10.1007/978-3-642-04159-4\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/HiroseK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/IndesteegeMPR08, author = {Sebastiaan Indesteege and Florian Mendel and Bart Preneel and Christian Rechberger}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Collisions and Other Non-random Properties for Step-Reduced {SHA-256}}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {276--293}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_18}, doi = {10.1007/978-3-642-04159-4\_18}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/IndesteegeMPR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KavuluruK08, author = {Ramakanth Kavuluru and Andrew Klapper}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Counting Functions for the \emph{k}-Error Linear Complexity of 2\({}^{\mbox{\emph{n}}}\)-Periodic Binary Sequences}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {151--164}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_10}, doi = {10.1007/978-3-642-04159-4\_10}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KavuluruK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/LauterS08, author = {Kristin E. Lauter and Katherine E. Stange}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {309--327}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_20}, doi = {10.1007/978-3-642-04159-4\_20}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/LauterS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/MichielsGH08, author = {Wil Michiels and Paul Gorissen and Henk D. L. Hollmann}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Cryptanalysis of a Generic Class of White-Box Implementations}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {414--428}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_27}, doi = {10.1007/978-3-642-04159-4\_27}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/MichielsGH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Patarin08, author = {Jacques Patarin}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {The "Coefficients H" Technique}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {328--345}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_21}, doi = {10.1007/978-3-642-04159-4\_21}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Patarin08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/PatarinS08, author = {Jacques Patarin and Yannick Seurin}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Building Secure Block Ciphers on Generic Attacks Assumptions}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {66--81}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_5}, doi = {10.1007/978-3-642-04159-4\_5}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/PatarinS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Rivain08, author = {Matthieu Rivain}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {On the Exact Success Rate of Side Channel Analysis in the Gaussian Model}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {165--183}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_11}, doi = {10.1007/978-3-642-04159-4\_11}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Rivain08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/SchostH08, author = {{\'{E}}ric Schost and Arash Hariri}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Subquadratic Polynomial Multiplication over \emph{GF}(2\({}^{\mbox{\emph{m}}}\)) Using Trinomial Bases and Chinese Remaindering}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {361--372}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_23}, doi = {10.1007/978-3-642-04159-4\_23}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/SchostH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Silverman08, author = {Joseph H. Silverman}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Lifting and Elliptic Curve Discrete Logarithms}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {82--102}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_6}, doi = {10.1007/978-3-642-04159-4\_6}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Silverman08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/SuzukiI08, author = {Kyohei Suzuki and Tetsu Iwata}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {373--386}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_24}, doi = {10.1007/978-3-642-04159-4\_24}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/SuzukiI08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WangWH08, author = {Meiqin Wang and Xiaoyun Wang and Changhui Hu}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {New Linear Cryptanalytic Results of Reduced-Round of {CAST-128} and {CAST-256}}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {429--441}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_28}, doi = {10.1007/978-3-642-04159-4\_28}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/WangWH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/WuZZ08, author = {Wenling Wu and Lei Zhang and Wentao Zhang}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {442--456}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_29}, doi = {10.1007/978-3-642-04159-4\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/WuZZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Zenner08, author = {Erik Zenner}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {A Cache Timing Analysis of {HC-256}}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {199--213}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_13}, doi = {10.1007/978-3-642-04159-4\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Zenner08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/ZhangF08, author = {Bin Zhang and Dengguo Feng}, editor = {Roberto Maria Avanzi and Liam Keliher and Francesco Sica}, title = {An Improved Fast Correlation Attack on Stream Ciphers}, booktitle = {Selected Areas in Cryptography, 15th International Workshop, {SAC} 2008, Sackville, New Brunswick, Canada, August 14-15, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5381}, pages = {214--227}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-04159-4\_14}, doi = {10.1007/978-3-642-04159-4\_14}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/ZhangF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.