-
181Published 2017Table of Contents: “…Authentication -- Cryptography -- Multi-party computation -- Cryptanalysis -- Coding Theory…”
Full Text via HEAL-Link
Electronic eBook -
182Published 2001Table of Contents: “…Cryptanalysis I -- Weaknesses in the Key Scheduling Algorithm of RC4 -- A Practical Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
183
-
184Published 2005Table of Contents: “… and Its Cryptographic Applications -- An Analysis of the XSL Algorithm -- Stream Cipher Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
185Published 2008Table of Contents: “… to Authenticated Dynamic Broadcast Encryption -- Cryptanalysis of Short Exponent RSA with Primes Sharing Least…”
Full Text via HEAL-Link
Electronic eBook -
186Published 2008Table of Contents: “… as the Diffie-Hellman Problem -- Session 7: Hardware and Cryptanalysis -- Using Normal Bases for Compact…”
Full Text via HEAL-Link
Electronic eBook -
187Published 2012Table of Contents: “… Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and χ2 Statistics -- Quo Vadis Quaternion…”
Full Text via HEAL-Link
Electronic eBook -
188Published 2013Table of Contents: “…Symmetric-key cryptography -- Public-key cryptography -- Algorithmic cryptanalysis -- Software…”
Full Text via HEAL-Link
Electronic eBook -
189Published 2015Table of Contents: “… computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric…”
Full Text via HEAL-Link
Electronic eBook -
190Published 2017Table of Contents: “… and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security…”
Full Text via HEAL-Link
Electronic eBook -
191Published 2017Table of Contents: “… and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security…”
Full Text via HEAL-Link
Electronic eBook -
192Published 2017Table of Contents: “… and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security…”
Full Text via HEAL-Link
Electronic eBook -
193
-
194Published 2018Table of Contents: “… Primitives -- Symmetric Key Cryptanalysis -- Public Key Encryption -- Authentication and Biometrics -- Cloud…”
Full Text via HEAL-Link
Electronic eBook -
195Published 2008Table of Contents: “… of Courtois, Finiasz and Sendrier Signature Scheme -- Cryptanalysis of MOR and Discrete Logarithms in Inner…”
Full Text via HEAL-Link
Electronic eBook -
196by Peeters, EricTable of Contents: “…General Introduction -- Side-Channel Cryptanalysis: a brief survey -- CMOS devices: sources…”
Published 2013
Full Text via HEAL-Link
Electronic eBook -
197Published 2002Table of Contents: “… -- Cryptanalysis I -- Cryptanalysis of Stream Cipher COS (2, 128) Mode I -- The Analysis of Zheng-Seberry Scheme…”
Full Text via HEAL-Link
Electronic eBook -
198Published 2005Table of Contents: “… Delivery -- Digital Signatures I -- Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable…”
Full Text via HEAL-Link
Electronic eBook -
199Published 2008Table of Contents: “… Adversary -- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers -- Multidimensional…”
Full Text via HEAL-Link
Electronic eBook -
200Published 2013Table of Contents: “… -- Cryptanalysis of Full RIPEMD-128 -- New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision…”
Full Text via HEAL-Link
Electronic eBook