Security analysis of GCM for communication | 2 | 0.37 | 2014 |
Parallelizable MAC revisited | 0 | 0.34 | 2014 |
Comments on "Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions" | 14 | 0.66 | 2013 |
Multiplicative Homomorphic E-Auction with Formally Provable Security. | 0 | 0.34 | 2013 |
Two Dragons - A Family of Fast Word-based Stream Ciphers. | 0 | 0.34 | 2012 |
How to fix two RSA-based PVSS schemes: exploration and solution | 0 | 0.34 | 2012 |
MASHA: low cost authentication with a new stream cipher | 1 | 0.37 | 2011 |
AES variants secure against related-key differential and boomerang attacks | 7 | 0.62 | 2011 |
EPCBC: a block cipher suitable for electronic product code encryption | 24 | 0.92 | 2011 |
Side-channel analysis of the K2 stream cipher | 6 | 0.70 | 2010 |
Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher | 2 | 0.44 | 2009 |
A critique of some chaotic-map and cellular automata-based stream ciphers | 0 | 0.34 | 2009 |
Differential a1ttack on five rounds of the SC2000 block cipher | 6 | 0.54 | 2009 |
Algebraic analysis of LEX | 0 | 0.34 | 2009 |
Tiny Dragon - An Encryption Algorithm for Wireless Sensor Networks | 3 | 0.47 | 2008 |
Bit-Pattern Based Integral Attack | 19 | 1.19 | 2008 |
On the security of the LILI family of stream ciphers against algebraic attacks | 5 | 0.45 | 2007 |
Cryptanalysis of the CRUSH hash function | 1 | 0.37 | 2007 |
Securing grid data using mandatory access controls | 2 | 0.73 | 2007 |
Improved cryptanalysis of MAG | 1 | 0.36 | 2006 |
Ensuring fast implementations of symmetric ciphers on the intel pentium 4 and beyond | 0 | 0.34 | 2006 |
Rekeying issues in the MUGI stream cipher | 3 | 0.42 | 2005 |
Dragon: a fast word based stream cipher | 20 | 1.58 | 2004 |
Strengthening the Key Schedule of the AES | 15 | 1.01 | 2002 |