Showing 181 - 200 results of 506 for search '"Cryptanalysis"', query time: 0.09s Refine Results
  1. 181
    Published 2017
    Table of Contents: “…Authentication -- Cryptography -- Multi-party computation -- Cryptanalysis -- Coding Theory…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 182
    Published 2001
    Table of Contents: “…Cryptanalysis I -- Weaknesses in the Key Scheduling Algorithm of RC4 -- A Practical Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 183
  4. 184
    Published 2005
    Table of Contents: “… and Its Cryptographic Applications -- An Analysis of the XSL Algorithm -- Stream Cipher Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 185
    Published 2008
    Table of Contents: “… to Authenticated Dynamic Broadcast Encryption -- Cryptanalysis of Short Exponent RSA with Primes Sharing Least…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 186
    Published 2008
    Table of Contents: “… as the Diffie-Hellman Problem -- Session 7: Hardware and Cryptanalysis -- Using Normal Bases for Compact…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 187
    Published 2012
    Table of Contents: “… Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and χ2 Statistics -- Quo Vadis Quaternion…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 188
    Published 2013
    Table of Contents: “…Symmetric-key cryptography -- Public-key cryptography -- Algorithmic cryptanalysis -- Software…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 189
    Published 2015
    Table of Contents: “… computation II: applications -- Anonymity and related applications -- Cryptanalysis and attacks (symmetric…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 190
    Published 2017
    Table of Contents: “… and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 191
    Published 2017
    Table of Contents: “… and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 192
    Published 2017
    Table of Contents: “… and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 193
  14. 194
    Published 2018
    Table of Contents: “… Primitives -- Symmetric Key Cryptanalysis -- Public Key Encryption -- Authentication and Biometrics -- Cloud…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 195
    Published 2008
    Table of Contents: “… of Courtois, Finiasz and Sendrier Signature Scheme -- Cryptanalysis of MOR and Discrete Logarithms in Inner…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 196
    by Peeters, Eric
    Published 2013
    Table of Contents: “…General Introduction -- Side-Channel Cryptanalysis: a brief survey -- CMOS devices: sources…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 197
    Published 2002
    Table of Contents: “… -- Cryptanalysis I -- Cryptanalysis of Stream Cipher COS (2, 128) Mode I -- The Analysis of Zheng-Seberry Scheme…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 198
    Published 2005
    Table of Contents: “… Delivery -- Digital Signatures I -- Cryptanalysis of a Forward Secure Blind Signature Scheme with Provable…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 199
    Published 2008
    Table of Contents: “… Adversary -- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers -- Multidimensional…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 200
    Published 2013
    Table of Contents: “… -- Cryptanalysis of Full RIPEMD-128 -- New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search