[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.5555/647931.740720guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Two Practical and Provably Secure Block Ciphers: BEARS and LION

Published: 21 February 1996 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2016)RIV for Robust Authenticated EncryptionRevised Selected Papers of the 23rd International Conference on Fast Software Encryption - Volume 978310.1007/978-3-662-52993-5_2(23-42)Online publication date: 20-Mar-2016
  • (2011)Scrambling for lightweight censorship resistanceProceedings of the 19th international conference on Security Protocols10.1007/978-3-642-25867-1_28(296-302)Online publication date: 28-Mar-2011
  • (2010)On the use of financial data as a random beaconProceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections10.5555/1924892.1924895(1-8)Online publication date: 9-Aug-2010
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
Proceedings of the Third International Workshop on Fast Software Encryption
February 1996
211 pages
ISBN:3540608656

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 21 February 1996

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2016)RIV for Robust Authenticated EncryptionRevised Selected Papers of the 23rd International Conference on Fast Software Encryption - Volume 978310.1007/978-3-662-52993-5_2(23-42)Online publication date: 20-Mar-2016
  • (2011)Scrambling for lightweight censorship resistanceProceedings of the 19th international conference on Security Protocols10.1007/978-3-642-25867-1_28(296-302)Online publication date: 28-Mar-2011
  • (2010)On the use of financial data as a random beaconProceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections10.5555/1924892.1924895(1-8)Online publication date: 9-Aug-2010
  • (2010)On generalized Feistel networksProceedings of the 30th annual conference on Advances in cryptology10.5555/1881412.1881455(613-630)Online publication date: 15-Aug-2010
  • (2010)A multi-user steganographic file system on untrusted shared storageProceedings of the 26th Annual Computer Security Applications Conference10.1145/1920261.1920309(317-326)Online publication date: 6-Dec-2010
  • (2008)The Analysis of Windows Vista Disk Encryption AlgorithmProceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security10.1007/978-3-540-70567-3_9(113-126)Online publication date: 13-Jul-2008
  • (2007)How to Enrich the Message Space of a CipherProceedings of the 14th international conference on Fast Software Encryption10.5555/2394499.2394509(101-118)Online publication date: 26-Mar-2007
  • (2007)The security of the extended codebook (XCB) mode of operationProceedings of the 14th international conference on Selected areas in cryptography10.5555/1784881.1784901(311-327)Online publication date: 16-Aug-2007
  • (2007)Generic attacks on unbalanced Feistel schemes with expanding functionsProceedings of the Advances in Crypotology 13th international conference on Theory and application of cryptology and information security10.5555/1781454.1781482(325-341)Online publication date: 2-Dec-2007
  • (2005)Hybrid symmetric encryption using known-plaintext attack-secure componentsProceedings of the 8th international conference on Information Security and Cryptology10.1007/11734727_21(242-260)Online publication date: 1-Dec-2005
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media