Skip to search formSkip to main contentSkip to account menu

ECRYPT

Known as: ECRYPT II 
ECRYPT (European Network of Excellence in Cryptology) was a 4-year European research initiative launched on 1 February 2004 with the stated objective… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Since the introduction of the concept of grouping proofs by Juels, which permit RFID tags to generate evidence that they have… 
Highly Cited
2011
Highly Cited
2011
The concept of conditional differential cryptanalysis has been applied to NLFSR-based cryptosystems at ASIACRYPT 2010. We improve… 
2010
2010
We describe our high-speed hardware modules for the 14 candidates of the second evaluation round of the SHA-3 hash function… 
2010
2010
Malicious alterations of integrated circuits (ICs), introduced during either the design or fabrication process, are increasingly… 
2010
2010
Algebraic cryptanalysis is a general tool which permits one to assess the security of a wide range of cryptographic schemes… 
2010
2010
Most cryptographic hash functions rely on a simpler primitive called a compression function, and in nearly all cases, there is a… 
2009
2009
The weakening of the widely used SHA-1 hash function has also cast doubts on the strength of the related algorithms of the SHA-2… 
Review
2007
Review
2007
We survey recent research on pairings on hyperelliptic curves and present a comparison of the performance characteristics of… 
Highly Cited
2007
Highly Cited
2007
Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several… 
2005
2005
This article presents some new results concerning two algebraic attacks against the F-FCSR constructions proposed in [2]. We…