| Publication | Date of Publication | Type |
|---|
Improved quantum circuits for AES: reducing the depth and the number of qubits | 2024-08-30 | Paper |
Threshold structure-preserving signatures | 2024-06-26 | Paper |
Cryptanalysis of \texttt{SPEEDY} | 2024-01-11 | Paper |
Provable secure software masking in the real-world Constructive Side-Channel Analysis and Secure Design | 2023-12-12 | Paper |
Stretching cube attacks: improved methods to recover massive superpolies Advances in Cryptology – ASIACRYPT 2022 | 2023-08-21 | Paper |
Implicit white-box implementations: white-boxing ARX ciphers Advances in Cryptology – CRYPTO 2022 | 2023-06-12 | Paper |
Categorization of faulty nonce misuse resistant message authentication Lecture Notes in Computer Science | 2023-05-12 | Paper |
A white-box speck implementation using self-equivalence encodings | 2022-11-09 | Paper |
A greater \texttt{GIFT}: strengthening \texttt{GIFT} against statistical cryptanalysis | 2022-08-30 | Paper |
Cross-domain attribute-based access control encryption | 2022-06-29 | Paper |
On self-equivalence encodings in white-box implementations | 2022-03-25 | Paper |
Systematic Security Analysis of Stream Encryption With Key Erasure IEEE Transactions on Information Theory | 2022-02-17 | Paper |
Meet-in-the-middle attacks on reduced-round GOST Matematicheskie Voprosy Kriptografii [Mathematical Aspects of Cryptography] | 2021-09-20 | Paper |
PROBLEMS, SOLUTIONS AND EXPERIENCE OF THE FIRST INTERNATIONAL STUDENT’S OLYMPIAD IN CRYPTOGRAPHY PRIKLADNAYa DISKRETNAYa MATEMATIKA | 2021-02-15 | Paper |
Improved interpolation attacks on cryptographic primitives of low algebraic degree | 2020-07-21 | Paper |
Block-anti-circulant unbalanced oil and vinegar | 2020-07-21 | Paper |
Public key compression for constrained linear signature schemes | 2019-02-20 | Paper |
An efficient entity authentication protocol with enhanced security and privacy properties | 2018-10-26 | Paper |
MQ signatures for PKI | 2018-09-12 | Paper |
Optimal forgeries against polynomial-based MACs and GCM | 2018-07-09 | Paper |
Multicore Curve-Based Cryptoprocessor with Reconfigurable Modular Arithmetic Logic Units over GF(2^n) IEEE Transactions on Computers | 2018-06-12 | Paper |
Short solutions to nonlinear systems of equations | 2018-06-05 | Paper |
A family of trapdoor ciphers Fast Software Encryption | 2018-05-09 | Paper |
A MAC mode for lightweight block ciphers Fast Software Encryption | 2018-05-09 | Paper |
Field lifting for smaller UOV public keys | 2018-04-26 | Paper |
The cipher SHARK Fast Software Encryption | 2017-11-15 | Paper |
RIPEMD-160: a strengthened version of RIPEMD Fast Software Encryption | 2017-11-15 | Paper |
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis IEEE Transactions on Information Theory | 2017-07-12 | Paper |
Publish or Perish: A Backward-Compatible Defense Against Selfish Mining in Bitcoin Topics in Cryptology – CT-RSA 2017 | 2017-04-12 | Paper |
On the influence of message length in PMAC's security bounds Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Mathematicians discuss the Snowden revelations: cryptographic standards, mass surveillance, and the NSA Notices of the American Mathematical Society | 2016-06-15 | Paper |
Forgery and subkey recovery on CAESAR candidate iFeed Lecture Notes in Computer Science | 2016-05-19 | Paper |
Extension field cancellation: a new central trapdoor for multivariate quadratic systems Post-Quantum Cryptography | 2016-04-26 | Paper |
Chaskey: an efficient MAC algorithm for 32-bit microcontrollers Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
On the impact of known-key attacks on hash functions Advances in Cryptology – ASIACRYPT 2015 | 2016-03-23 | Paper |
On the XOR of multiple random permutations Applied Cryptography and Network Security | 2016-03-10 | Paper |
Cryptanalysis of the Xiao-Lai white-box AES implementation Selected Areas in Cryptography | 2015-12-04 | Paper |
Open problems in hash function security Designs, Codes and Cryptography | 2015-10-26 | Paper |
Two-permutation-based hashing with binary mixing Journal of Mathematical Cryptology | 2015-10-13 | Paper |
AEGIS: a fast authenticated encryption algorithm Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
Two attacks on a white-box AES implementation Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
Breaking and Fixing Cryptophia’s Short Combiner Cryptology and Network Security | 2015-02-10 | Paper |
On the security of two MAC algorithms Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
Internal differential collision attacks on the reduced-round Grøstl-0 hash function Designs, Codes and Cryptography | 2014-03-17 | Paper |
Challenging the increased resistance of regular hash functions against birthday attacks Journal of Mathematical Cryptology | 2013-01-17 | Paper |
A model for structure attacks, with applications to PRESENT and Serpent Fast Software Encryption | 2013-01-08 | Paper |
UNAF: a special set of additive differences with application to the differential analysis of ARX Fast Software Encryption | 2013-01-08 | Paper |
Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming Information Security and Cryptology | 2013-01-07 | Paper |
Hash functions based on three permutations: a generic security analysis Lecture Notes in Computer Science | 2012-09-25 | Paper |
Impossible differential cryptanalysis of the lightweight block ciphers TEA, XTEA and HIGHT Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein Progress in Cryptology - AFRICACRYPT 2012 | 2012-07-23 | Paper |
DES collisions revisited Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
A practical attack on KeeLoq Journal of Cryptology | 2012-05-23 | Paper |
A lightweight 256-bit hash function for hardware and low-end devices: Lesamnta-LW Information Security and Cryptology - ICISC 2010 | 2011-10-27 | Paper |
Algebraic techniques in differential cryptanalysis revisited Information Security and Privacy | 2011-07-07 | Paper |
Finding Collisions for Reduced Luffa-256 v2 (Poster) Information Security and Privacy | 2011-07-07 | Paper |
The Additive Differential Probability of ARX Fast Software Encryption | 2011-07-07 | Paper |
The NIST SHA-3 Competition: A Perspective on the Final Year Lecture Notes in Computer Science | 2011-06-29 | Paper |
Equivalent keys in \(\mathcal M\)ultivariate \(\mathcal Q\)uadratic public key systems Journal of Mathematical Cryptology | 2011-05-13 | Paper |
Practical collisions for EnRUPT Journal of Cryptology | 2011-04-01 | Paper |
The differential analysis of S-functions Selected Areas in Cryptography | 2011-03-15 | Paper |
A privacy-preserving ID-based group key agreement scheme applied in VPAN SOFSEM 2011: Theory and Practice of Computer Science | 2011-02-15 | Paper |
Security reductions of the second round SHA-3 candidates Lecture Notes in Computer Science | 2011-02-11 | Paper |
Meet-in-the-middle attacks on reduced-round XTEA Topics in Cryptology – CT-RSA 2011 | 2011-02-11 | Paper |
Improved collision attacks on the reduced-round Grøstl hash function Lecture Notes in Computer Science | 2011-02-11 | Paper |
Cryptographic hash functions: theory and practice Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
Cryptanalysis of a perturbated white-box AES implementation Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
Increased resilience in threshold cryptography: sharing a secret with devices that cannot store shares Lecture Notes in Computer Science | 2010-11-26 | Paper |
Cryptanalysis of the ESSENCE family of hash functions Information Security and Cryptology | 2010-11-23 | Paper |
On the indifferentiability of the Grøstl hash function Lecture Notes in Computer Science | 2010-09-10 | Paper |
Optimistic fair priced oblivious transfer Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Parallel shortest lattice vector enumeration on graphics cards Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings | 2010-05-04 | Paper |
Speed records for NTRU Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
Revisiting Higher-Order DPA Attacks: Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
The first 30 years of cryptographic hash functions and the NIST SHA-3 competition Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |
A note on weak keys of PES, IDEA, and some extended variants Lecture Notes in Computer Science | 2010-02-09 | Paper |
Cryptanalysis of 3-pass HAVAL Lecture Notes in Computer Science | 2010-01-05 | Paper |
Cryptanalysis of Sober-t32. Lecture Notes in Computer Science | 2010-01-05 | Paper |
A concrete security analysis for 3GPP-MAC. Lecture Notes in Computer Science | 2010-01-05 | Paper |
Practical collisions for SHAMATA-256 Selected Areas in Cryptography | 2009-12-09 | Paper |
Cryptanalysis of dynamic SHA(2) Selected Areas in Cryptography | 2009-12-09 | Paper |
Collisions and Other Non-random Properties for Step-Reduced SHA-256 Selected Areas in Cryptography | 2009-11-03 | Paper |
A Three-Property-Secure Hash Function Selected Areas in Cryptography | 2009-11-03 | Paper |
Improved Distinguishing Attacks on HC-256 Advances in Information and Computer Security | 2009-10-28 | Paper |
The Future of Cryptographic Algorithms Advances in Information and Computer Security | 2009-10-28 | Paper |
Towards Security Notions for White-Box Cryptography Lecture Notes in Computer Science | 2009-09-29 | Paper |
A New Approach to χ 2 Cryptanalysis of Block Ciphers Lecture Notes in Computer Science | 2009-09-29 | Paper |
Spectral characterization of cryptographic Boolean functions satisfying the (extended) propagation criterion of degreeland order \(k\) Information Processing Letters | 2009-08-27 | Paper |
Universally Composable Adaptive Priced Oblivious Transfer Pairing-Based Cryptography – Pairing 2009 | 2009-08-18 | Paper |
Practical Collisions for EnRUPT Fast Software Encryption | 2009-08-11 | Paper |
The State of Hash Functions and the NIST SHA-3 Competition Information Security and Cryptology | 2009-04-29 | Paper |
Cryptanalysis of the Stream Cipher DECIM Fast Software Encryption | 2009-04-02 | Paper |
Distinguishing Attacks on the Stream Cipher Py Fast Software Encryption | 2009-04-02 | Paper |
Resynchronization Attacks on WG and LEX Fast Software Encryption | 2009-04-02 | Paper |
Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms Lecture Notes in Computer Science | 2009-02-10 | Paper |
On Boolean functions with generalized cryptographic properties | 2009-02-09 | Paper |
Classification of the cosets of \(\text{RM}(1,7)\) in \(\text{RM}(3,7)\) revisited | 2009-02-09 | Paper |
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B Research in Cryptology | 2009-01-22 | Paper |
Preimages for Reduced-Round Tiger Research in Cryptology | 2009-01-22 | Paper |
Remote attestation on legacy operating systems with trusted platform modules Science of Computer Programming | 2009-01-09 | Paper |
On the Covering Radii of Binary Reed–Muller Codes in the Set of Resilient Boolean Functions IEEE Transactions on Information Theory | 2008-12-21 | Paper |
A new inequality in discrete fourier theory IEEE Transactions on Information Theory | 2008-12-21 | Paper |
Classification of cubic (n-4)-resilient Boolean functions IEEE Transactions on Information Theory | 2008-12-21 | Paper |
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract) Lecture Notes in Computer Science | 2008-11-27 | Paper |
Collisions for RC4-Hash Lecture Notes in Computer Science | 2008-11-20 | Paper |
Related-Key Rectangle Attacks on Reduced AES-192 and AES-256 Fast Software Encryption | 2008-09-16 | Paper |
Differential-Linear Attacks Against the Stream Cipher Phelix Fast Software Encryption | 2008-09-16 | Paper |
Trivium Lecture Notes in Computer Science | 2008-07-03 | Paper |
scientific article; zbMATH DE number 5295623 (Why is no real title available?) | 2008-07-01 | Paper |
On proactive verifiable secret sharing schemes | 2008-07-01 | Paper |
New Weaknesses in the Keystream Generation Algorithms of the Stream Ciphers TPy and Py Lecture Notes in Computer Science | 2008-06-24 | Paper |
Efficient Negative Databases from Cryptographic Hash Functions Lecture Notes in Computer Science | 2008-06-24 | Paper |
Analysis of Grain’s Initialization Algorithm Progress in Cryptology – AFRICACRYPT 2008 | 2008-06-13 | Paper |
Seven-Property-Preserving Iterated Hashing: ROX Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
On the (In)security of Stream Ciphers Based on Arrays and Modular Addition Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
A Weakness in Some Oblivious Transfer and Zero-Knowledge Protocols Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Cryptanalysis of Reduced Variants of the FORK-256 Hash Function Lecture Notes in Computer Science | 2008-04-17 | Paper |
A Practical Attack on KeeLoq Advances in Cryptology – EUROCRYPT 2008 | 2008-04-15 | Paper |
Improved Meet-in-the-Middle Attacks on Reduced-Round DES Lecture Notes in Computer Science | 2008-04-11 | Paper |
Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses Lecture Notes in Computer Science | 2008-04-11 | Paper |
Update on Tiger Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings Selected Areas in Cryptography | 2008-03-25 | Paper |
nPAKE + : A Hierarchical Group Password-Authenticated Key Exchange Protocol Using Different Passwords Information and Communications Security | 2008-03-25 | Paper |
Cryptanalysis of the two-dimensional circulation encryption algorithm EURASIP Journal on Applied Signal Processing | 2008-03-20 | Paper |
On the Algebraic Immunity of Symmetric Boolean Functions Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries Progress in Cryptology - INDOCRYPT 2005 | 2008-03-17 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2008-02-19 | Paper |
Blind Differential Cryptanalysis for Enhanced Power Attacks Selected Areas in Cryptography | 2007-11-29 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
Progress in Cryptology - INDOCRYPT 2003 Lecture Notes in Computer Science | 2007-11-29 | Paper |
Cryptanalysis of the Stream Cipher ABC v2 Selected Areas in Cryptography | 2007-11-29 | Paper |
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy Advances in Cryptology - EUROCRYPT 2007 | 2007-11-29 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2007-11-28 | Paper |
HW/SW co-design for public-key cryptosystems on the 8051 micro-controller Computers and Electrical Engineering | 2007-10-10 | Paper |
Differential power and electromagnetic attacks on a FPGA implementation of elliptic curve cryptosystems Computers and Electrical Engineering | 2007-10-10 | Paper |
Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks Information Security and Privacy | 2007-09-07 | Paper |
A survey of recent developments in cryptographic algorithms for smart cards Computer Networks | 2007-06-04 | Paper |
On the security of stepwise triangular systems Designs, Codes and Cryptography | 2006-11-22 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2006-11-01 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2006-11-01 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2006-10-24 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2006-10-10 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
scientific article; zbMATH DE number 5041007 (Why is no real title available?) | 2006-07-14 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2006-06-22 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Automata, Languages and Programming Lecture Notes in Computer Science | 2006-01-10 | Paper |
Fast Software Encryption Lecture Notes in Computer Science | 2005-12-27 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2005-12-27 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |
Public Key Cryptography - PKC 2005 Lecture Notes in Computer Science | 2005-12-07 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Cryptographic Hardware and Embedded Systems - CHES 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Information and Communications Security Lecture Notes in Computer Science | 2005-08-19 | Paper |
On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds | 2005-08-12 | Paper |
Higher Order Universal One-Way Hash Functions | 2005-08-12 | Paper |
Construction of secure and fast hash functions using nonbinary error-correcting codes IEEE Transactions on Information Theory | 2005-05-11 | Paper |
scientific article; zbMATH DE number 2163010 (Why is no real title available?) | 2005-04-29 | Paper |
scientific article; zbMATH DE number 2090930 (Why is no real title available?) | 2004-08-13 | Paper |
scientific article; zbMATH DE number 2089312 (Why is no real title available?) | 2004-08-12 | Paper |
scientific article; zbMATH DE number 2089136 (Why is no real title available?) | 2004-08-12 | Paper |
Producing Collisions for PANAMA Fast Software Encryption | 2004-08-12 | Paper |
scientific article; zbMATH DE number 2085431 (Why is no real title available?) | 2004-08-09 | Paper |
scientific article; zbMATH DE number 2085438 (Why is no real title available?) | 2004-08-09 | Paper |
scientific article; zbMATH DE number 2085215 (Why is no real title available?) | 2004-08-09 | Paper |
scientific article; zbMATH DE number 2077194 (Why is no real title available?) | 2004-07-01 | Paper |
scientific article; zbMATH DE number 2077187 (Why is no real title available?) | 2004-07-01 | Paper |
scientific article; zbMATH DE number 2077191 (Why is no real title available?) | 2004-07-01 | Paper |
scientific article; zbMATH DE number 2009947 (Why is no real title available?) | 2003-11-26 | Paper |
scientific article; zbMATH DE number 1980970 (Why is no real title available?) | 2003-09-15 | Paper |
scientific article; zbMATH DE number 1955807 (Why is no real title available?) | 2003-07-29 | Paper |
scientific article; zbMATH DE number 1955809 (Why is no real title available?) | 2003-07-29 | Paper |
scientific article; zbMATH DE number 1952896 (Why is no real title available?) | 2003-07-24 | Paper |
scientific article; zbMATH DE number 1759316 (Why is no real title available?) | 2003-01-25 | Paper |
scientific article; zbMATH DE number 1810472 (Why is no real title available?) | 2002-11-25 | Paper |
scientific article; zbMATH DE number 1759274 (Why is no real title available?) | 2002-10-13 | Paper |
scientific article; zbMATH DE number 1808207 (Why is no real title available?) | 2002-09-30 | Paper |
scientific article; zbMATH DE number 1700373 (Why is no real title available?) | 2002-02-10 | Paper |
Attacks on fast double block length hash functions Journal of Cryptology | 2001-11-22 | Paper |
scientific article; zbMATH DE number 1504779 (Why is no real title available?) | 2000-11-07 | Paper |
scientific article; zbMATH DE number 1504537 (Why is no real title available?) | 2000-10-30 | Paper |
scientific article; zbMATH DE number 1504780 (Why is no real title available?) | 2000-09-12 | Paper |
scientific article; zbMATH DE number 1504778 (Why is no real title available?) | 2000-09-12 | Paper |
Design principles for dedicated hash functions Fast Software Encryption | 2000-08-30 | Paper |
scientific article; zbMATH DE number 1455101 (Why is no real title available?) | 2000-06-05 | Paper |
scientific article; zbMATH DE number 1455100 (Why is no real title available?) | 2000-06-05 | Paper |
scientific article; zbMATH DE number 1418241 (Why is no real title available?) | 2000-03-19 | Paper |
scientific article; zbMATH DE number 1418255 (Why is no real title available?) | 2000-03-19 | Paper |
scientific article; zbMATH DE number 1418243 (Why is no real title available?) | 2000-03-19 | Paper |
Software Performance of Universal Hash Functions Advances in Cryptology — EUROCRYPT ’99 | 2000-03-13 | Paper |
scientific article; zbMATH DE number 1304190 (Why is no real title available?) | 2000-03-07 | Paper |
scientific article; zbMATH DE number 1304281 (Why is no real title available?) | 2000-02-15 | Paper |
On the security of iterated message authentication codes IEEE Transactions on Information Theory | 1999-11-21 | Paper |
scientific article; zbMATH DE number 1186947 (Why is no real title available?) | 1999-06-29 | Paper |
Analysis Methods for (Alleged) RC4 Lecture Notes in Computer Science | 1999-06-17 | Paper |
scientific article; zbMATH DE number 1088255 (Why is no real title available?) | 1998-03-10 | Paper |
On weaknesses of non-surjective round functions Designs, Codes and Cryptography | 1998-01-07 | Paper |
scientific article; zbMATH DE number 1024002 (Why is no real title available?) | 1997-08-26 | Paper |
scientific article; zbMATH DE number 1030977 (Why is no real title available?) | 1997-08-14 | Paper |
scientific article; zbMATH DE number 1024038 (Why is no real title available?) | 1997-08-10 | Paper |
scientific article; zbMATH DE number 1024070 (Why is no real title available?) | 1997-06-18 | Paper |
scientific article; zbMATH DE number 1024058 (Why is no real title available?) | 1997-06-18 | Paper |
scientific article; zbMATH DE number 1182525 (Why is no real title available?) | 1997-01-01 | Paper |
scientific article; zbMATH DE number 177031 (Why is no real title available?) | 1993-05-18 | Paper |
Boolean Functions Satisfying Higher Order Propagation Criteria Advances in Cryptology — EUROCRYPT ’91 | 1993-05-18 | Paper |
scientific article; zbMATH DE number 30323 (Why is no real title available?) | 1992-06-27 | Paper |
A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang Advances in Cryptology — CRYPTO’ 89 Proceedings | 1990-01-01 | Paper |