Showing 201 - 220 results of 506 for search '"Cryptanalysis"', query time: 0.10s Refine Results
  1. 201
    Published 2009
    Table of Contents: “… and Reduced Variants with Equivalent Security -- Cryptanalysis -- A Statistical Saturation Attack against…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 202
    Published 2008
    Table of Contents: “… Control for Enterprise Networks -- Cryptanalysis -- Cryptanalysis of Rabbit -- Algebraic Attack on HFE…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 203
    Published 2013
    Table of Contents: “… User Access Authorization Exceptions in Conventional Role-based Access Control -- Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 204
    Published 2013
    Table of Contents: “…Cryptography and Cryptanalysis -- Multiplicative Homomorphic E-Auction with Formally Provable…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 205
  6. 206
    Published 2010
    Table of Contents: “… of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness -- Cryptanalysis -- Linear Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 207
  8. 208
    Published 2013
    Table of Contents: “… -- Quantum Key Distribution in the Classical Authenticated Key Exchange Framework -- Cryptanalysis of Hash…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 209
    Published 2005
    Table of Contents: “…Stream Cipher Cryptanalysis -- An Improved Correlation Attack on A5/1 -- Extending…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 210
    Published 2018
    Table of Contents: “… cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 211
    Published 2002
    Table of Contents: “… -- Protecting Software Code by Guards -- How to Manage Persistent State in DRM Systems -- Cryptanalysis -- A…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 212
    Published 2018
    Table of Contents: “… -- Public-Key Encryption -- Encryption with Bad Randomness -- Subversion Resistance -- Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 213
    Published 2018
    Table of Contents: “… -- Public-Key Encryption -- Encryption with Bad Randomness -- Subversion Resistance -- Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 214
    Published 2010
    Table of Contents: “… -- Supporting Technology -- Improved Cryptanalysis of the FOX Block Cipher -- Bitwise Higher Order Differential…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 215
    Published 2001
    Table of Contents: “… System -- Marking: A Privacy Protecting Approach Against Blackmailing -- Cryptanalysis of Two Sparse…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 216
    Published 2010
    Table of Contents: “…Block Ciphers -- Cryptanalysis of Reduced-Round MIBS Block Cipher -- Impossible Differential…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 217
    Published 2004
    Table of Contents: “… -- Public Key Cryptanalysis -- On the Security of MOR Public Key Cryptosystem -- Cryptanalyzing…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 218
    Published 2006
    Table of Contents: “… -- Cryptanalysis -- Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 219
    Published 2017
    Table of Contents: “…-like Ciphers for Authenticated Encryption -- Improved Differential Cryptanalysis on Generalized Feistel…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 220
    Published 2008
    Table of Contents: “…Session I: Algebraic and Number Theoretical Cryptanalysis (I) -- Total Break of the ?-IC Signature…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search