ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Research in Cryptology - Lecture Notes in Computer Science
Latest Publications
TOTAL DOCUMENTS
12
(FIVE YEARS 0)
H-INDEX
3
(FIVE YEARS 0)
Published By Springer Berlin Heidelberg
9783540883524, 9783540883531
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups
Research in Cryptology - Lecture Notes in Computer Science
◽
10.1007/978-3-540-88353-1_7
◽
2009
◽
pp. 78-89
Author(s):
Anja Korsten
Keyword(s):
Automorphism Groups
◽
Discrete Logarithms
◽
Inner Automorphism
Download Full-text
Combiner Driven Management Models and Their Applications
Research in Cryptology - Lecture Notes in Computer Science
◽
10.1007/978-3-540-88353-1_10
◽
2009
◽
pp. 114-126
Author(s):
Michael Beiter
Keyword(s):
Management Models
Download Full-text
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256
Research in Cryptology - Lecture Notes in Computer Science
◽
10.1007/978-3-540-88353-1_3
◽
2009
◽
pp. 28-38
◽
Cited By ~ 1
Author(s):
Marko Hölbl
◽
Christian Rechberger
◽
Tatjana Welzer
Download Full-text
Preimages for Reduced-Round Tiger
Research in Cryptology - Lecture Notes in Computer Science
◽
10.1007/978-3-540-88353-1_8
◽
2009
◽
pp. 90-99
◽
Cited By ~ 5
Author(s):
Sebastiaan Indesteege
◽
Bart Preneel
Download Full-text
Cryptography Based on Quadratic Forms: Complexity Considerations
Research in Cryptology - Lecture Notes in Computer Science
◽
10.1007/978-3-540-88353-1_5
◽
2009
◽
pp. 52-64
Author(s):
Rupert J. Hartung
Keyword(s):
Quadratic Forms
Download Full-text
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation
Research in Cryptology - Lecture Notes in Computer Science
◽
10.1007/978-3-540-88353-1_12
◽
2009
◽
pp. 142-152
◽
Cited By ~ 2
Author(s):
María Naya-Plasencia
Download Full-text
Efficient Hash Collision Search Strategies on Special-Purpose Hardware
Research in Cryptology - Lecture Notes in Computer Science
◽
10.1007/978-3-540-88353-1_4
◽
2009
◽
pp. 39-51
◽
Cited By ~ 2
Author(s):
Tim Güneysu
◽
Christof Paar
◽
Sven Schäge
Keyword(s):
Search Strategies
Download Full-text
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
Research in Cryptology - Lecture Notes in Computer Science
◽
10.1007/978-3-540-88353-1_11
◽
2009
◽
pp. 127-141
◽
Cited By ~ 1
Author(s):
Gautham Sekar
◽
Souradyuti Paul
◽
Bart Preneel
Keyword(s):
Stream Cipher
Download Full-text
The GPS Identification Scheme Using Frobenius Expansions
Research in Cryptology - Lecture Notes in Computer Science
◽
10.1007/978-3-540-88353-1_2
◽
2008
◽
pp. 13-27
◽
Cited By ~ 2
Author(s):
Waldyr D. Benits
◽
Steven D. Galbraith
Keyword(s):
Identification Scheme
Download Full-text
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme
Research in Cryptology - Lecture Notes in Computer Science
◽
10.1007/978-3-540-88353-1_6
◽
2008
◽
pp. 65-77
◽
Cited By ~ 12
Author(s):
Léonard Dallot
Keyword(s):
Signature Scheme
◽
Security Proof
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close