Search results for: Orr Dunkelman
Journal of Cryptology > 2019 > 32 > 4 > 1448-1490
IEEE Transactions on Information Forensics and Security > 2017 > 12 > 11 > 2640 - 2653
Journal of Cryptology > 2018 > 31 > 3 > 641-670
Lecture Notes in Computer Science > Information and Communications Security > Cryptanalysis > 141-156
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2009 > Hash Functions > 157-168
Lecture Notes in Computer Science > Selected Areas in Cryptography > Hash Functions and Stream Ciphers > 393-414
Lecture Notes in Computer Science > Selected Areas in Cryptography > Block Cipher Cryptanalysis > 28-44
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2008 > Block Ciphers > 279-293
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2007 > Symmetric-Key Encryption > 20-30
Lecture Notes in Computer Science > Fast Software Encryption > Cryptanalysis of Block Ciphers I > 16-27
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2006 > Symmetric Cryptography: Attacks > 17-31
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2006 > Block Ciphers > 412-427
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 10: Attacks II > 462-478
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2009 > Hash Functions > 14-28