Matthew J. B. Robshaw

According to our database1, Matthew J. B. Robshaw authored at least 58 papers between 1993 and 2016.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2016
On the Security of the Algebraic Eraser Tag Authentication Protocol.
IACR Cryptol. ePrint Arch., 2016

2015
Introduction to the CHES 2014 special issue.
J. Cryptogr. Eng., 2015

Algebraic Cryptanalysis and RFID Authentication.
Proceedings of the Radio Frequency Identification. Security and Privacy Issues, 2015

2012
The LED Block Cipher.
IACR Cryptol. ePrint Arch., 2012

Improved (and Practical) Public-Key Authentication for UHF RFID Tags.
Proceedings of the Smart Card Research and Advanced Applications, 2012

On Area, Time, and the Right Trade-Off.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Trapdoor One-Way Function.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

One-Way Function.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

On Related-Key Attacks and KASUMI: The Case of A5/3.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

The Block Cipher Companion.
Information Security and Cryptography, Springer, ISBN: 978-3-642-17341-7, 2011

2010
Lightweight Cryptography and RFID: Tackling the Hidden Overhead.
KSII Trans. Internet Inf. Syst., 2010

Low-cost digital signature architecture suitable for radio frequency identification tags.
IET Comput. Digit. Tech., 2010

PRINTcipher: A Block Cipher for IC-Printing.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

On Unbiased Linear Approximations.
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010

2009
Lightweight Cryptography and RFID: Tackling the Hidden Overheads.
Proceedings of the Information, Security and Cryptology, 2009

The Intel AES Instructions Set and the SHA-3 Candidates.
Proceedings of the Advances in Cryptology, 2009

2008
The eSTREAM Project.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008

HB#: Increasing the Security and Efficiency of HB+.
IACR Cryptol. ePrint Arch., 2008

The Cryptanalysis of Reduced-Round SMS4.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

How to Encrypt with the LPN Problem.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

Good Variants of HB<sup>+</sup> Are Hard to Find.
Proceedings of the Financial Cryptography and Data Security, 12th International Conference, 2008

HB<sup>#</sup>: Increasing the Security and Efficiency of HB<sup>+</sup>.
Proceedings of the Advances in Cryptology, 2008

Hash Functions and RFID Tags: Mind the Gap.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2008

Correlated Keystreams in Moustique.
Proceedings of the Progress in Cryptology, 2008

Looking Back at a New Hash Function.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
New Architectures for Low-Cost Public Key Cryptography on RFID Tags.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2007), 2007

Public Key Cryptography and RFID Tags.
Proceedings of the Topics in Cryptology, 2007

PRESENT: An Ultra-Lightweight Block Cipher.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

On Building Hash Functions from Multivariate Quadratic Equations.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
An overview of RFID tags and new cryptographic developments.
Inf. Secur. Tech. Rep., 2006

Searching for Compact Algorithms: cgen.
Proceedings of the Progressin Cryptology, 2006

Non-randomness in eSTREAM Candidates Salsa20 and TSC-4.
Proceedings of the Progress in Cryptology, 2006

Combining Compression Functions and Block Cipher-Based Hash Functions.
Proceedings of the Advances in Cryptology, 2006

Algebraic aspects of the advanced encryption standard.
Springer, ISBN: 978-0-387-24363-4, 2006

2005
Trapdoor One-Way Function.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

One-Way Function.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

An Active Attack Against HB+ - A Provably Secure Lightweight Authentication Protocol.
IACR Cryptol. ePrint Arch., 2005

Securing RSA-KEM via the AES.
Proceedings of the Public Key Cryptography, 2005

An Algebraic Framework for Cipher Embeddings.
Proceedings of the Cryptography and Coding, 2005

Small Scale Variants of the AES.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

A Dynamic Key Infrastructure for Grid.
Proceedings of the Advances in Grid Computing, 2005

2004
On Permutation Operations in Cipher Design.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

On Identity-Based Cryptography and Grid Computing.
Proceedings of the Computational Science, 2004

The Cryptanalysis of the AES - A Brief Survey.
Proceedings of the Advanced Encryption Standard - AES, 4th International Conference, 2004

2003
Ten Years of Information Security Masters Programmes.
Proceedings of the Security Education and Critical Infrastructures, 2003

2002
Key-Dependent S-Boxes and Differential Cryptanalysis.
Des. Codes Cryptogr., 2002

Essential Algebraic Structure within the AES.
Proceedings of the Advances in Cryptology, 2002

2001
Analysis of SHA-1 in Encryption Mode.
Proceedings of the Topics in Cryptology, 2001

2000
RC6 as the AES.
Proceedings of the Third Advanced Encryption Standard Candidate Conference, 2000

1999
Improved Analysis of Some Simplified Variants of RC6.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

Truncated Differentials and Skipjack.
Proceedings of the Advances in Cryptology, 1999

1998
On the Design and Security of RC2.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

1996
Non-Linear Approximations in Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 1996

1995
Storage efficient decoding for a class of binary be Bruijn sequences.
Discret. Math., 1995

1994
On Evaluating the Linear Complexity of a Sequence of Least Period 2<sup>n</sup>.
Des. Codes Cryptogr., 1994

Linear Cryptanalysis Using Multiple Approximations and FEAL.
Proceedings of the Fast Software Encryption: Second International Workshop. Leuven, 1994

Linear Cryptanalysis Using Multiple Approximations.
Proceedings of the Advances in Cryptology, 1994

1993
Fast Block Cipher Proposal.
Proceedings of the Fast Software Encryption, 1993


  Loading...