Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,168,518 papers from all fields of science
Search
Sign In
Create Free Account
ECRYPT
Known as:
ECRYPT II
ECRYPT (European Network of Excellence in Cryptology) was a 4-year European research initiative launched on 1 February 2004 with the stated objective…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
23 relations
ABC (stream cipher)
CJCSG
CryptMT
Crypto++
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2012
2012
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
L. Batina
,
Y. Lee
,
Stefaan Seys
,
Dave Singelée
,
I. Verbauwhede
Personal and Ubiquitous Computing
2012
Corpus ID: 3730130
Since the introduction of the concept of grouping proofs by Juels, which permit RFID tags to generate evidence that they have…
Expand
Highly Cited
2011
Highly Cited
2011
Conditional Differential Cryptanalysis of Trivium and KATAN
Simon Knellwolf
,
W. Meier
,
M. Naya-Plasencia
ACM Symposium on Applied Computing
2011
Corpus ID: 40295199
The concept of conditional differential cryptanalysis has been applied to NLFSR-based cryptosystems at ASIACRYPT 2010. We improve…
Expand
2010
2010
Uniform Evaluation of Hardware Implementations of the Round-Two SHA-3 Candidates
S. Tillich
,
Martin Feldhofer
,
Mario Kirschbaum
,
Thomas Plos
,
Jörn-Marc Schmidt
,
Alexander Szekely
2010
Corpus ID: 10653970
We describe our high-speed hardware modules for the 14 candidates of the second evaluation round of the SHA-3 hash function…
Expand
2010
2010
Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software
Jean-François Gallais
,
J. Großschädl
,
+6 authors
M. Wójcik
International Conference on Trusted Systems
2010
Corpus ID: 6082476
Malicious alterations of integrated circuits (ICs), introduced during either the design or fabrication process, are increasingly…
Expand
2010
2010
Algebraic Precomputations in Differential and Integral Cryptanalysis
Martin R. Albrecht
,
C. Cid
,
T. Dullien
,
J. Faugère
,
Ludovic Perret
Conference on Information Security and Cryptology
2010
Corpus ID: 16061702
Algebraic cryptanalysis is a general tool which permits one to assess the security of a wide range of cryptographic schemes…
Expand
2010
2010
Practical Hash Functions Constructions Resistant to Generic Second Preimage Attacks Beyond the Birthday Bound
Charles Bouillaguet
,
Pierre-Alain Fouque
2010
Corpus ID: 15607505
Most cryptographic hash functions rely on a simpler primitive called a compression function, and in nearly all cases, there is a…
Expand
2009
2009
Compact Hardware Implementations of the SHA-3 Candidates ARIRANG, BLAKE, Gröstl, and Skein
S. Tillich
,
Martin Feldhofer
,
+7 authors
M. Mayrhofer
IACR Cryptology ePrint Archive
2009
Corpus ID: 14915419
The weakening of the widely used SHA-1 hash function has also cast doubts on the strength of the related algorithms of the SHA-2…
Expand
Review
2007
Review
2007
Hyperelliptic Pairings
S. Galbraith
,
F. Hess
,
F. Vercauteren
Pairing-Based Cryptography
2007
Corpus ID: 13210953
We survey recent research on pairings on hyperelliptic curves and present a comparison of the performance characteristics of…
Expand
Highly Cited
2007
Highly Cited
2007
A Framework for Chosen IV Statistical Analysis of Stream Ciphers
Håkan Englund
,
T. Johansson
,
Meltem Sönmez Turan
International Conference on Cryptology in India
2007
Corpus ID: 18097959
Saarinen recently proposed a chosen IV statistical attack, called the d-monomial test, and used it to find weaknesses in several…
Expand
2005
2005
Two Algebraic Attacks Against the F-FCSRs Using the IV Mode
T. Berger
,
M. Minier
International Conference on Cryptology in India
2005
Corpus ID: 14688977
This article presents some new results concerning two algebraic attacks against the F-FCSR constructions proposed in [2]. We…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE