Filter your results
- 12
- 12
- 12
- 4
- 3
- 5
- 3
- 1
- 12
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Security Margin Evaluation of SHA-3 Contest Finalists through SAT-Based Attacks11th International Conference on Computer Information Systems and Industrial Management (CISIM), Sep 2012, Venice, Italy. pp.56-67, ⟨10.1007/978-3-642-33260-9_4⟩
Conference papers
hal-01551728v1
|
||
|
Cryptanalysis of 2-Layer Nonlinear Piece in Hand Method1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.91-104
Conference papers
hal-01506559v1
|
||
|
Cryptanalysis of a SIP Authentication Scheme12th Communications and Multimedia Security (CMS), Oct 2011, Ghent, Belgium. pp.134-143, ⟨10.1007/978-3-642-24712-5_11⟩
Conference papers
hal-01596196v1
|
||
|
AES Variants Secure against Related-Key Differential and Boomerang Attacks5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.191-207, ⟨10.1007/978-3-642-21040-2_13⟩
Conference papers
hal-01573307v1
|
||
|
A Robust Remote User Authentication Scheme against Smart Card Security Breach23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.231-238, ⟨10.1007/978-3-642-22348-8_18⟩
Conference papers
hal-01586587v1
|
||
|
On the Security of an Authenticated Group Key Transfer Protocol Based on Secret Sharing1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.399-408, ⟨10.1007/978-3-642-36818-9_44⟩
Conference papers
hal-01480199v1
|
||
|
Security Vulnerabilities of User Authentication Scheme Using Smart Card26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.106-113, ⟨10.1007/978-3-642-31540-4_8⟩
Conference papers
hal-01534770v1
|
||
|
Impossible Differential Cryptanalysis of Reduced-Round LBlock6th International Workshop on Information Security Theory and Practice (WISTP), Jun 2012, Egham, United Kingdom. pp.179-188, ⟨10.1007/978-3-642-30955-7_16⟩
Conference papers
hal-01534301v1
|
||
|
Secure Password-Based Remote User Authentication Scheme with Non-tamper Resistant Smart Cards26th Conference on Data and Applications Security and Privacy (DBSec), Jul 2012, Paris, France. pp.114-121, ⟨10.1007/978-3-642-31540-4_9⟩
Conference papers
hal-01534767v1
|
||
|
Breaking a Robust Remote User Authentication Scheme Using Smart Cards9th International Conference on Network and Parallel Computing (NPC), Sep 2012, Gwangju, South Korea. pp.110-118, ⟨10.1007/978-3-642-35606-3_13⟩
Conference papers
hal-01551357v1
|
||
|
Virtual Expansion of Rainbow Tables6th IFIP WG 11.9 International Conference on Digital Forensics (DF), Jan 2010, Hong Kong, China. pp.243-256, ⟨10.1007/978-3-642-15506-2_17⟩
Conference papers
hal-01060622v1
|
||
|
Differential Cryptanalysis and Boomerang Cryptanalysis of LBlock1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.1-15
Conference papers
hal-01506560v1
|