-
281Published 2000Table of Contents: “… Exponentiation with no Final Subtractions: Improved Results -- Physical Security and Cryptanalysis -- Physical…”
Full Text via HEAL-Link
Electronic eBook -
282Published 1998Table of Contents: “… differential attack and cryptanalysis of the KN cipher -- An optimised linear attack on pseudorandom generators…”
Full Text via HEAL-Link
Electronic eBook -
283Published 1997Table of Contents: “… -- Cryptanalysis of adaptive arithmetic coding encryption schemes -- Fast correlation attacks and multiple linear…”
Full Text via HEAL-Link
Electronic eBook -
284Published 2009Table of Contents: “… Cryptanalysis with Applications on Reduced Round Serpent -- Almost Fully Optimized Infinite Classes of Boolean…”
Full Text via HEAL-Link
Electronic eBook -
285Published 2009Table of Contents: “… on the HMAC/NMAC Based on 3 and 4-Pass HAVAL -- Cryptanalysis -- Memoryless Related-Key Boomerang Attack…”
Full Text via HEAL-Link
Electronic eBook -
286Published 2009Table of Contents: “… in Low-Bandwidth Access Networks -- Hash Functions -- Cryptanalysis of Twister -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
287Published 2008Table of Contents: “…Stream Ciphers -- Slid Pairs in Salsa20 and Trivium -- New Directions in Cryptanalysis of Self…”
Full Text via HEAL-Link
Electronic eBook -
288Published 2019Table of Contents: “… -- Impossible Differential Cryptanalysis of SPECK -- Detect Peer-To-Peer Botnet with Permutation Entropy…”
Full Text via HEAL-Link
Electronic eBook -
289Published 2009Table of Contents: “… and Applications to Coding Theory -- Overview of Cryptanalysis Techniques in Multivariate Public Key Cryptography…”
Full Text via HEAL-Link
Electronic eBook -
290
-
291
-
292
-
293
-
294
-
295
-
296
-
297
-
298
-
299
-
300