Search dblp for Publications

export results for "toc:db/journals/ccds/ccds4.bht:"

 download as .bib file

@article{DBLP:journals/ccds/0002VM12,
  author       = {Yi Lu and
                  Serge Vaudenay and
                  Willi Meier},
  title        = {Synthetic linear analysis with applications to CubeHash and Rabbit},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {3-4},
  pages        = {259--276},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-012-0064-8},
  doi          = {10.1007/S12095-012-0064-8},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/0002VM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/AgrenLHJ12,
  author       = {Martin {\AA}gren and
                  Carl L{\"{o}}ndahl and
                  Martin Hell and
                  Thomas Johansson},
  title        = {A survey on fast correlation attacks},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {3-4},
  pages        = {173--202},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-012-0062-x},
  doi          = {10.1007/S12095-012-0062-X},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ccds/AgrenLHJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/BeelenL12,
  author       = {Peter Beelen and
                  Gregor Leander},
  title        = {A new construction of highly nonlinear S-boxes},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {1},
  pages        = {65--77},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-011-0052-4},
  doi          = {10.1007/S12095-011-0052-4},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/BeelenL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/BileschiCP12,
  author       = {Maxwell L. Bileschi and
                  Thomas W. Cusick and
                  Daniel Padgett},
  title        = {Weights of Boolean cubic monomial rotation symmetric functions},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {2},
  pages        = {105--130},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-011-0060-4},
  doi          = {10.1007/S12095-011-0060-4},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/BileschiCP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/CanteautN12,
  author       = {Anne Canteaut and
                  Mar{\'{\i}}a Naya{-}Plasencia},
  title        = {Correlation attacks on combination generators},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {3-4},
  pages        = {147--171},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-012-0069-3},
  doi          = {10.1007/S12095-012-0069-3},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/CanteautN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/DinurS12,
  author       = {Itai Dinur and
                  Adi Shamir},
  title        = {Applying cube attacks to stream ciphers in realistic scenarios},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {3-4},
  pages        = {217--232},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-012-0068-4},
  doi          = {10.1007/S12095-012-0068-4},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/DinurS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/HermelinN12,
  author       = {Miia Hermelin and
                  Kaisa Nyberg},
  title        = {Multidimensional linear distinguishing attacks and Boolean functions},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {1},
  pages        = {47--64},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-011-0053-3},
  doi          = {10.1007/S12095-011-0053-3},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/HermelinN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/KamalY12,
  author       = {Abdel Alim Kamal and
                  Amr M. Youssef},
  title        = {Fault analysis of the NTRUSign digital signature scheme},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {2},
  pages        = {131--144},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-011-0061-3},
  doi          = {10.1007/S12095-011-0061-3},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/KamalY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/KnellwolfM12,
  author       = {Simon Knellwolf and
                  Willi Meier},
  title        = {High order differential attacks on stream ciphers},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {3-4},
  pages        = {203--215},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-012-0071-9},
  doi          = {10.1007/S12095-012-0071-9},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/KnellwolfM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/MaitraS12,
  author       = {Subhamoy Maitra and
                  Palash Sarkar},
  title        = {Guest editorial},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {3-4},
  pages        = {145--146},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-012-0073-7},
  doi          = {10.1007/S12095-012-0073-7},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/MaitraS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/OrumiehchihaPS12,
  author       = {Mohammad Ali Orumiehchiha and
                  Josef Pieprzyk and
                  Ron Steinfeld},
  title        = {Cryptanalysis of {WG-7:} a lightweight stream cipher},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {3-4},
  pages        = {277--285},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-012-0070-x},
  doi          = {10.1007/S12095-012-0070-X},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/OrumiehchihaPS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Pasalic12,
  author       = {Enes Pasalic},
  title        = {A design of Boolean functions resistant to (fast) algebraic cryptanalysis
                  with efficient implementation},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {1},
  pages        = {25--45},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-011-0057-z},
  doi          = {10.1007/S12095-011-0057-Z},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Pasalic12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Poinsot12,
  author       = {Laurent Poinsot},
  title        = {Non Abelian bent functions},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {1},
  pages        = {1--23},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-011-0058-y},
  doi          = {10.1007/S12095-011-0058-Y},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Poinsot12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/SiD12,
  author       = {Wenpei Si and
                  Cunsheng Ding},
  title        = {A simple stream cipher with proven properties},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {2},
  pages        = {79--104},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-011-0059-x},
  doi          = {10.1007/S12095-011-0059-X},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/SiD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/SimpsonB12,
  author       = {Leonie Simpson and
                  Serdar Boztas},
  title        = {State cycles, initialization and the Trivium stream cipher},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {3-4},
  pages        = {245--258},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-012-0066-6},
  doi          = {10.1007/S12095-012-0066-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/SimpsonB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccds/Turan12,
  author       = {Meltem S{\"{o}}nmez Turan},
  title        = {On the nonlinearity of maximum-length {NFSR} feedbacks},
  journal      = {Cryptogr. Commun.},
  volume       = {4},
  number       = {3-4},
  pages        = {233--243},
  year         = {2012},
  url          = {https://doi.org/10.1007/s12095-012-0067-5},
  doi          = {10.1007/S12095-012-0067-5},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccds/Turan12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}