Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,166,817 papers from all fields of science
Search
Sign In
Create Free Account
NESSIE
Known as:
Nessie (disambiguation)
, New European Schemes for Signatures, Integrity and Encryption
NESSIE (New European Schemes for Signatures, Integrity and Encryption) was a European research project funded from 2000–2003 to identify secure…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
26 relations
ACE Encrypt
CBC-MAC
CRYPTREC
CS-Cipher
Expand
Broader (1)
Cryptography standards
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Improving Underwater Vehicle navigation state estimation using Locally Weighted Projection Regression
G. Fagogenis
,
D. Flynn
,
D. Lane
IEEE International Conference on Robotics and…
2014
Corpus ID: 14977784
Navigation is instrumental in the successful deployment of Autonomous Underwater Vehicles (AUVs). Sensor hardware is installed on…
Expand
2009
2009
Improved cryptographic processor designs for security in rfid and other ubiquitous systems
C. Papachristou
,
Lawrence Leinweber
2009
Corpus ID: 53850582
In order to provide security in ubiquitous, passively powered systems, especially RFID tags in the supply chain, improved…
Expand
2005
2005
A new design criteria for hash-functions
J. Coron
,
Y. Dodis
,
Cécile Malinaud
,
P. Puniya
2005
Corpus ID: 5925011
The most common way of constructing a hash function (e.g., SHA-1) is to iterate a compression function on the input message. The…
Expand
2004
2004
Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2
N. Courtois
International Conference on Theory and Practice…
2004
Corpus ID: 18657278
The problem MQ of solving a system of multivariate quadratic equations over a finite field is relevant to the security of AES and…
Expand
2003
2003
NESSIE D21 - Performance of Optimized Implementations of the NESSIE Primitives
B. Preneel
,
B. V. Rompay
,
+11 authors
J. Stolin
2003
Corpus ID: 59848006
IST-2000-12324 Project Title NESSIE Deliverable Type Report Security Class Public Deliverable Number D21 Title of Deliverable…
Expand
2002
2002
ECIES-KEM vs. PSEC-KEM
A. Dent
2002
Corpus ID: 14227861
The purpose of this paper is to discuss the similarities and differences between the PSEC-KEM and ECIES-KEM. The schemes are in…
Expand
2001
2001
The social web cockpit: support for virtual communities
Wolfgang Gräther
,
W. Prinz
Group
2001
Corpus ID: 9465408
This paper describes the design and functionality of the Social Web Cockpit, an assistant that supports users while traversing…
Expand
2001
2001
The Statistical Evaluation of the NESSIE Submission BMGL
Stefan Pyka
2001
Corpus ID: 57961409
The submission BMGL is a pseudo-random number generator with the block cipher Rijndael as cryptographic core. Rijndael is…
Expand
2001
2001
NESSIE Document NES/DOC/SAG/WP3/038/1 † The Statistical Evaluation of the NESSIE Submission UMAC
Stefan Pyka
2001
Corpus ID: 62054755
The purpose of this document is to give a statistical evaluation of the NESSIE submission UMAC, a message authentication code…
Expand
1973
1973
Nessie the Mannerless Monster
T. Hughes
,
G. Rose
1973
Corpus ID: 191276227
This poem tells the story of how the Loch Ness monster, weary of having her existence denied, sets off towards London.
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE