Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 714 matches
- 2011
- Farzaneh Abazari, Babak Sadeghian:
Cryptanalysis with Ternary Difference: Applied to Block Cipher PRESENT. IACR Cryptol. ePrint Arch. 2011: 22 (2011) - Imran Abbasi, Mehreen Afzal:
A Compact S-Box Design for SMS4 Block Cipher. IACR Cryptol. ePrint Arch. 2011: 522 (2011) - Mohamed Ahmed Abdelraheem, Céline Blondeau, María Naya-Plasencia, Marion Videau, Erik Zenner:
Cryptanalysis of ARMADILLO2. IACR Cryptol. ePrint Arch. 2011: 160 (2011) - Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner:
Cryptanalysis of the Light-Weight Cipher A2U2 - Reduced draft version. IACR Cryptol. ePrint Arch. 2011: 262 (2011) - Tolga Acar, Kristin E. Lauter, Michael Naehrig, Daniel Shumow:
Affine Pairings on ARM. IACR Cryptol. ePrint Arch. 2011: 243 (2011) - Shweta Agrawal, Xavier Boyen, Vinod Vaikuntanathan, Panagiotis Voulgaris, Hoeteck Wee:
Fuzzy Identity Based Encryption from Lattices. IACR Cryptol. ePrint Arch. 2011: 414 (2011) - Shweta Agrawal, David Mandell Freeman, Vinod Vaikuntanathan:
Functional Encryption for Inner Product Predicates from Learning with Errors. IACR Cryptol. ePrint Arch. 2011: 410 (2011) - Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Secure Message Transmission In Asynchronous Directed Networks. IACR Cryptol. ePrint Arch. 2011: 13 (2011) - Shashank Agrawal, Abhinav Mehta, Kannan Srinathan:
Unconditionally Reliable Message Transmission in Directed Neighbour Networks. IACR Cryptol. ePrint Arch. 2011: 14 (2011) - Martin Ågren:
Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64. IACR Cryptol. ePrint Arch. 2011: 140 (2011) - Martin Ågren, Thomas Johansson:
Linear Cryptanalysis of PRINTcipher - Trails and Samples Everywhere. IACR Cryptol. ePrint Arch. 2011: 423 (2011) - Junaid Jameel Ahmad, Shujun Li, Ahmad-Reza Sadeghi, Thomas Schneider:
CTL: A Platform-Independent Crypto Tools Library Based on Dataflow Programming Paradigm. IACR Cryptol. ePrint Arch. 2011: 679 (2011) - Omran Ahmadi, Robert Granger:
On isogeny classes of Edwards curves over finite fields. IACR Cryptol. ePrint Arch. 2011: 135 (2011) - Omran Ahmadi, Robert Granger:
An efficient deterministic test for Kloosterman sum zeros. IACR Cryptol. ePrint Arch. 2011: 199 (2011) - Hadi Ahmadi, Reihaneh Safavi-Naini:
Secret Keys from Channel Noise. IACR Cryptol. ePrint Arch. 2011: 63 (2011) - Hadi Ahmadi, Reihaneh Safavi-Naini:
Common Randomness and Secret Key Capacities of Two-way Channels. IACR Cryptol. ePrint Arch. 2011: 106 (2011) - Naveed Ahmed, Christian Damsgaard Jensen, Erik Zenner:
Private-key Symbolic Encryption. IACR Cryptol. ePrint Arch. 2011: 564 (2011) - Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. IACR Cryptol. ePrint Arch. 2011: 96 (2011) - Laila El Aimani:
Generic Constructions for Verifiable Signcryption. IACR Cryptol. ePrint Arch. 2011: 592 (2011) - Joseph A. Akinyele, Matthew Green, Aviel D. Rubin:
Charm: A framework for Rapidly Prototyping Cryptosystems. IACR Cryptol. ePrint Arch. 2011: 617 (2011) - Saif Al-Kuwari, James H. Davenport, Russell J. Bradford:
Cryptographic Hash Functions: Recent Design Trends and Security Notions. IACR Cryptol. ePrint Arch. 2011: 565 (2011) - Martin R. Albrecht, Carlos Cid:
Cold Boot Key Recovery by Solving Polynomial Systems with Noise. IACR Cryptol. ePrint Arch. 2011: 38 (2011) - Martin R. Albrecht, Carlos Cid, Jean-Charles Faugère, Ludovic Perret:
On the Relation Between the Mutant Strategy and the Normal Selection Strategy in Gröbner Basis Algorithms. IACR Cryptol. ePrint Arch. 2011: 164 (2011) - Martin R. Albrecht, Pooya Farshim, Jean-Charles Faugère, Ludovic Perret:
Polly Cracker, Revisited. IACR Cryptol. ePrint Arch. 2011: 289 (2011) - Martin R. Albrecht, Pooya Farshim, Kenneth G. Paterson, Gaven J. Watson:
On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model. IACR Cryptol. ePrint Arch. 2011: 213 (2011) - A. N. Alekseychuk, L. V. Kovalchuk:
Towards a Theory of Security Evaluation for GOST-like Ciphers against Differential and Linear Cryptanalysis. IACR Cryptol. ePrint Arch. 2011: 489 (2011) - Javad Alizadeh, Abdolrasoul Mirghadri:
A New Distinguisher for CubeHash-8/b and CubeHash-15/b Compression Functions. IACR Cryptol. ePrint Arch. 2011: 550 (2011) - Joël Alwen, Jonathan Katz, Ueli Maurer, Vassilis Zikas:
Collusion-Preserving Computation. IACR Cryptol. ePrint Arch. 2011: 433 (2011) - Antoine Amarilli, Sascha Müller, David Naccache, Daniel Page, Pablo Rauzy, Michael Tunstall:
Can Code Polymorphism Limit Information Leakage? IACR Cryptol. ePrint Arch. 2011: 99 (2011) - Antoine Amarilli, David Naccache, Pablo Rauzy, Emil Simion:
Can a Program Reverse-Engineer Itself? IACR Cryptol. ePrint Arch. 2011: 497 (2011)
skipping 684 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-03-19 14:18 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint