Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 39 matches
- 2018
- Ling Song, Jian Guo:
Cube-Attack-Like Cryptanalysis of Round-Reduced Keccak Using MILP. IACR Trans. Symmetric Cryptol. 2018(3): 182-214 (2018) - Gianira N. Alfarano, Christof Beierle, Takanori Isobe, Stefan Kölbl, Gregor Leander:
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny. IACR Trans. Symmetric Cryptol. 2018(2): 20-47 (2018) - Subhadeep Banik, Andrey Bogdanov, Atul Luykx, Elmar Tischhauser:
SUNDAE: Small Universal Deterministic Authenticated Encryption for the Internet of Things. IACR Trans. Symmetric Cryptol. 2018(3): 1-35 (2018) - Subhadeep Banik, Vasily Mikhalev, Frederik Armknecht, Takanori Isobe, Willi Meier, Andrey Bogdanov, Yuhei Watanabe, Francesco Regazzoni:
Towards Low Energy Stream Ciphers. IACR Trans. Symmetric Cryptol. 2018(2): 1-19 (2018) - Zhenzhen Bao, Jian Guo, Lei Wang:
Functional Graphs and Their Applications in Generic Attacks on Iterated Hash Constructions. IACR Trans. Symmetric Cryptol. 2018(1): 201-253 (2018) - Christof Beierle, Anne Canteaut, Gregor Leander:
Nonlinear Approximations in Cryptanalysis Revisited. IACR Trans. Symmetric Cryptol. 2018(4): 80-101 (2018) - Srimanta Bhattacharya, Mridul Nandi:
Revisiting Variable Output Length XOR Pseudorandom Function. IACR Trans. Symmetric Cryptol. 2018(1): 314-335 (2018) - Eli Biham, Stav Perle:
Conditional Linear Cryptanalysis - Cryptanalysis of DES with Less Than 242 Complexity. IACR Trans. Symmetric Cryptol. 2018(3): 215-264 (2018) - Andrey Bogdanov, Elmar Tischhauser, Philip S. Vejre:
Multivariate Profiling of Hulls for Linear Cryptanalysis. IACR Trans. Symmetric Cryptol. 2018(1): 101-125 (2018) - Charles Bouillaguet, Claire Delaplace, Pierre-Alain Fouque:
Revisiting and Improving Algorithms for the 3XOR Problem. IACR Trans. Symmetric Cryptol. 2018(1): 254-276 (2018) - Christina Boura, Anne Canteaut:
On the Boomerang Uniformity of Cryptographic Sboxes. IACR Trans. Symmetric Cryptol. 2018(3): 290-310 (2018) - Colin Chaigneau, Thomas Fuhr, Henri Gilbert, Jian Guo, Jérémy Jean, Jean-René Reinhard, Ling Song:
Key-Recovery Attacks on Full Kravatte. IACR Trans. Symmetric Cryptol. 2018(1): 5-28 (2018) - Paul Crowley, Eric Biggers:
Adiantum: length-preserving encryption for entry-level processors. IACR Trans. Symmetric Cryptol. 2018(4): 39-61 (2018) - Joan Daemen, Seth Hoffert, Gilles Van Assche, Ronny Van Keer:
The design of Xoodoo and Xoofff. IACR Trans. Symmetric Cryptol. 2018(4): 1-38 (2018) - Joan Daemen, Bart Mennink, Gilles Van Assche:
Sound Hashing Modes of Arbitrary Functions, Permutations, and Block Ciphers. IACR Trans. Symmetric Cryptol. 2018(4): 197-228 (2018) - Nilanjan Datta, Avijit Dutta, Mridul Nandi, Goutam Paul:
Double-block Hash-then-Sum: A Paradigm for Constructing BBB Secure PRF. IACR Trans. Symmetric Cryptol. 2018(3): 36-92 (2018) - Patrick Derbez, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo, Haoyang Wang, Meiqin Wang:
Cryptanalysis of AES-PRF and Its Dual. IACR Trans. Symmetric Cryptol. 2018(2): 161-191 (2018) - Sébastien Duval, Gaëtan Leurent:
MDS Matrices with Lightweight Circuits. IACR Trans. Symmetric Cryptol. 2018(2): 48-78 (2018) - Maria Eichlseder, Daniel Kales:
Clustering Related-Tweak Characteristics: Application to MANTIS-6. IACR Trans. Symmetric Cryptol. 2018(2): 111-132 (2018) - Stian Fauskanger, Igor A. Semaev:
Separable Statistics and Multidimensional Linear Cryptanalysis. IACR Trans. Symmetric Cryptol. 2018(2): 79-110 (2018) - Serge Fehr, Pierre Karpman, Bart Mennink:
Short Non-Malleable Codes from Related-Key Secure Block Ciphers. IACR Trans. Symmetric Cryptol. 2018(1): 336-352 (2018) - Thomas Fuhr, María Naya-Plasencia, Yann Rotella:
State-Recovery Attacks on Modified Ketje Jr. IACR Trans. Symmetric Cryptol. 2018(1): 29-56 (2018) - Ashrujit Ghoshal, Rajat Sadhukhan, Sikhar Patranabis, Nilanjan Datta, Stjepan Picek, Debdeep Mukhopadhyay:
Lightweight and Side-channel Secure 4 × 4 S-Boxes from Cellular Automata Rules. IACR Trans. Symmetric Cryptol. 2018(3): 311-334 (2018) - Lorenzo Grassi:
Mixture Differential Cryptanalysis: a New Approach to Distinguishers and Attacks on round-reduced AES. IACR Trans. Symmetric Cryptol. 2018(2): 133-160 (2018) - Mathias Hall-Andersen, Philip S. Vejre:
Generating Graphs Packed with Paths Estimation of Linear Approximations and Differentials. IACR Trans. Symmetric Cryptol. 2018(3): 265-289 (2018) - Tao Huang, Hongjun Wu:
Distinguishing Attack on NORX Permutation. IACR Trans. Symmetric Cryptol. 2018(1): 57-73 (2018) - Suyash Kandele, Souradyuti Paul:
Key Assignment Scheme with Authenticated Encryption. IACR Trans. Symmetric Cryptol. 2018(4): 150-196 (2018) - Marie-Sarah Lacharité, Kenneth G. Paterson:
Frequency-smoothing encryption: preventing snapshot attacks on deterministically encrypted data. IACR Trans. Symmetric Cryptol. 2018(1): 277-313 (2018) - Gregor Leander, Cihangir Tezcan, Friedrich Wiemer:
Searching for Subspace Trails and Truncated Differentials. IACR Trans. Symmetric Cryptol. 2018(1): 74-100 (2018) - Yongqiang Li, Shizhu Tian, Yuyin Yu, Mingsheng Wang:
On the Generalization of Butterfly Structure. IACR Trans. Symmetric Cryptol. 2018(1): 160-179 (2018)
skipping 9 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-13 09:13 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint