What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Matthew J. B. Robshaw
Google Scholar
29
publications in security and cryptology related venues
Year
Venue
Title
2016
conf/acns
On the Security of the Algebraic Eraser Tag Authentication Protocol.
Simon R. Blackburn
Matthew J. B. Robshaw
2012
conf/acisp
On Area, Time, and the Right Trade-Off.
Axel Poschmann
Matthew J. B. Robshaw
2011
conf/ches
The LED Block Cipher.
Jian Guo
Thomas Peyrin
Axel Poschmann
Matthew J. B. Robshaw
2010
conf/acisp
On Unbiased Linear Approximations.
Jonathan Etrog
Matthew J. B. Robshaw
2010
conf/ches
PRINTcipher: A Block Cipher for IC-Printing.
Lars R. Knudsen
Gregor Leander
Axel Poschmann
Matthew J. B. Robshaw
2009
conf/icisc
Lightweight Cryptography and RFID: Tackling the Hidden Overheads.
Axel Poschmann
Matthew J. B. Robshaw
Frank Vater
Christof Paar
2009
conf/asiacrypt
The Intel AES Instructions Set and the SHA-3 Candidates.
Ryad Benadjila
Olivier Billet
Shay Gueron
Matthew J. B. Robshaw
2008
conf/acisp
Looking Back at a New Hash Function.
Olivier Billet
Matthew J. B. Robshaw
Yannick Seurin
Yiqun Lisa Yin
2008
conf/fc
Good Variants of HB<sup>+</sup> Are Hard to Find.
Henri Gilbert
Matthew J. B. Robshaw
Yannick Seurin
2008
conf/ches
Hash Functions and RFID Tags: Mind the Gap.
Andrey Bogdanov
Gregor Leander
Christof Paar
Axel Poschmann
Matthew J. B. Robshaw
Yannick Seurin
2008
conf/eurocrypt
HB<sup>#</sup>: Increasing the Security and Efficiency of HB<sup>+</sup>.
Henri Gilbert
Matthew J. B. Robshaw
Yannick Seurin
2008
conf/africacrypt
Correlated Keystreams in Moustique.
Emilia Käsper
Vincent Rijmen
Tor E. Bjørstad
Christian Rechberger
Matthew J. B. Robshaw
Gautham Sekar
2008
conf/sacrypt
The Cryptanalysis of Reduced-Round SMS4.
Jonathan Etrog
Matthew J. B. Robshaw
2007
conf/acisp
On Building Hash Functions from Multivariate Quadratic Equations.
Olivier Billet
Matthew J. B. Robshaw
Thomas Peyrin
2007
conf/ches
PRESENT: An Ultra-Lightweight Block Cipher.
Andrey Bogdanov
Lars R. Knudsen
Gregor Leander
Christof Paar
Axel Poschmann
Matthew J. B. Robshaw
Yannick Seurin
C. Vikkelsoe
2007
conf/ctrsa
Public Key Cryptography and RFID Tags.
Máire McLoone
Matthew J. B. Robshaw
2006
journals/istr
An overview of RFID tags and new cryptographic developments.
Matthew J. B. Robshaw
2006
conf/asiacrypt
Combining Compression Functions and Block Cipher-Based Hash Functions.
Thomas Peyrin
Henri Gilbert
Frédéric Muller
Matthew J. B. Robshaw
2005
conf/fse
Small Scale Variants of the AES.
Carlos Cid
Sean Murphy
Matthew J. B. Robshaw
2005
conf/pkc
Securing RSA-KEM via the AES.
Jakob Jonsson
Matthew J. B. Robshaw
2002
conf/crypto
Essential Algebraic Structure within the AES.
Sean Murphy
Matthew J. B. Robshaw
2001
conf/ctrsa
Analysis of SHA-1 in Encryption Mode.
Helena Handschuh
Lars R. Knudsen
Matthew J. B. Robshaw
1999
conf/fse
Improved Analysis of Some Simplified Variants of RC6.
Scott Contini
Ronald L. Rivest
Matthew J. B. Robshaw
Yiqun Lisa Yin
1999
conf/crypto
Truncated Differentials and Skipjack.
Lars R. Knudsen
Matthew J. B. Robshaw
David A. Wagner
1998
conf/fse
On the Design and Security of RC2.
Lars R. Knudsen
Vincent Rijmen
Ronald L. Rivest
Matthew J. B. Robshaw
1996
conf/eurocrypt
Non-Linear Approximations in Linear Cryptanalysis.
Lars R. Knudsen
Matthew J. B. Robshaw
1994
conf/fse
Linear Cryptanalysis Using Multiple Approximations and FEAL.
Burton S. Kaliski Jr.
Matthew J. B. Robshaw
1994
conf/crypto
Linear Cryptanalysis Using Multiple Approximations.
Burton S. Kaliski Jr.
Matthew J. B. Robshaw
1993
conf/fse
Fast Block Cipher Proposal.
Burton S. Kaliski Jr.
Matthew J. B. Robshaw
Coauthors
Andrey Bogdanov
(2)
Axel Poschmann
(6)
Burton S. Kaliski Jr.
(3)
C. Vikkelsoe
(1)
Carlos Cid
(1)
Christian Rechberger
(1)
Christof Paar
(3)
David A. Wagner
(1)
Emilia Käsper
(1)
Frank Vater
(1)
Frédéric Muller
(1)
Gautham Sekar
(1)
Gregor Leander
(3)
Helena Handschuh
(1)
Henri Gilbert
(3)
Jakob Jonsson
(1)
Jian Guo
(1)
Jonathan Etrog
(2)
Lars R. Knudsen
(6)
Máire McLoone
(1)
Matthew J. B. Robshaw
(29)
Olivier Billet
(3)
Ronald L. Rivest
(2)
Ryad Benadjila
(1)
Scott Contini
(1)
Sean Murphy
(2)
Shay Gueron
(1)
Simon R. Blackburn
(1)
Thomas Peyrin
(3)
Tor E. Bjørstad
(1)
Vincent Rijmen
(2)
Yannick Seurin
(5)
Yiqun Lisa Yin
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to