


default search action
WEWoRC 2007: Bochum, Germany
- Stefan Lucks, Ahmad-Reza Sadeghi, Christopher Wolf:
Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers. Lecture Notes in Computer Science 4945, Springer 2008, ISBN 978-3-540-88352-4 - Rei Yoshida, Rie Shigetomi, Kazuki Yoshizoe, Akira Otsuka, Hideki Imai:
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services. 1-12 - Waldyr D. Benits Junior, Steven D. Galbraith
:
The GPS Identification Scheme Using Frobenius Expansions. 13-27 - Marko Hölbl
, Christian Rechberger, Tatjana Welzer:
Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256. 28-38 - Tim Güneysu
, Christof Paar, Sven Schäge
:
Efficient Hash Collision Search Strategies on Special-Purpose Hardware. 39-51 - Rupert J. Hartung:
Cryptography Based on Quadratic Forms: Complexity Considerations. 52-64 - Léonard Dallot:
Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme. 65-77 - Anja Korsten:
Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups. 78-89 - Sebastiaan Indesteege, Bart Preneel:
Preimages for Reduced-Round Tiger. 90-99 - Nicolas T. Courtois, Blandine Debraize:
Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts. 100-113 - Michael Beiter:
Combiner Driven Management Models and Their Applications. 114-126 - Gautham Sekar, Souradyuti Paul, Bart Preneel
:
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B. 127-141 - María Naya-Plasencia:
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation. 142-152

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.