-
201Published 2009Table of Contents: “… and Reduced Variants with Equivalent Security -- Cryptanalysis -- A Statistical Saturation Attack against…”
Full Text via HEAL-Link
Electronic eBook -
202Published 2008Table of Contents: “… Control for Enterprise Networks -- Cryptanalysis -- Cryptanalysis of Rabbit -- Algebraic Attack on HFE…”
Full Text via HEAL-Link
Electronic eBook -
203Published 2013Table of Contents: “… User Access Authorization Exceptions in Conventional Role-based Access Control -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
204Published 2013Table of Contents: “…Cryptography and Cryptanalysis -- Multiplicative Homomorphic E-Auction with Formally Provable…”
Full Text via HEAL-Link
Electronic eBook -
205
-
206Published 2010Table of Contents: “… of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness -- Cryptanalysis -- Linear Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
207
-
208Published 2013Table of Contents: “… -- Quantum Key Distribution in the Classical Authenticated Key Exchange Framework -- Cryptanalysis of Hash…”
Full Text via HEAL-Link
Electronic eBook -
209Published 2005Table of Contents: “…Stream Cipher Cryptanalysis -- An Improved Correlation Attack on A5/1 -- Extending…”
Full Text via HEAL-Link
Electronic eBook -
210Published 2018Table of Contents: “… cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security…”
Full Text via HEAL-Link
Electronic eBook -
211Published 2002Table of Contents: “… -- Protecting Software Code by Guards -- How to Manage Persistent State in DRM Systems -- Cryptanalysis -- A…”
Full Text via HEAL-Link
Electronic eBook -
212Published 2018Table of Contents: “… -- Public-Key Encryption -- Encryption with Bad Randomness -- Subversion Resistance -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
213Published 2018Table of Contents: “… -- Public-Key Encryption -- Encryption with Bad Randomness -- Subversion Resistance -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
214Published 2010Table of Contents: “… -- Supporting Technology -- Improved Cryptanalysis of the FOX Block Cipher -- Bitwise Higher Order Differential…”
Full Text via HEAL-Link
Electronic eBook -
215Published 2001Table of Contents: “… System -- Marking: A Privacy Protecting Approach Against Blackmailing -- Cryptanalysis of Two Sparse…”
Full Text via HEAL-Link
Electronic eBook -
216Published 2010Table of Contents: “…Block Ciphers -- Cryptanalysis of Reduced-Round MIBS Block Cipher -- Impossible Differential…”
Full Text via HEAL-Link
Electronic eBook -
217Published 2004Table of Contents: “… -- Public Key Cryptanalysis -- On the Security of MOR Public Key Cryptosystem -- Cryptanalyzing…”
Full Text via HEAL-Link
Electronic eBook -
218Published 2006Table of Contents: “… -- Cryptanalysis -- Cryptanalysis of Timestamp-Based Password Authentication Schemes Using Smart Cards…”
Full Text via HEAL-Link
Electronic eBook -
219Published 2017Table of Contents: “…-like Ciphers for Authenticated Encryption -- Improved Differential Cryptanalysis on Generalized Feistel…”
Full Text via HEAL-Link
Electronic eBook -
220Published 2008Table of Contents: “…Session I: Algebraic and Number Theoretical Cryptanalysis (I) -- Total Break of the ?-IC Signature…”
Full Text via HEAL-Link
Electronic eBook