Showing 301 - 320 results of 506 for search '"Cryptanalysis"', query time: 0.28s Refine Results
  1. 301
  2. 302
  3. 303
  4. 304
  5. 305
  6. 306
    Published 2003
    Table of Contents: “… on Watermarking Algorithms -- Cryptanalysis of UCLA Watermarking Schemes for Intellectual Property Protection…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 307
    Published 2002
    Table of Contents: “… -- Round-Optimal Contributory Conference Key Agreement -- Cryptanalysis I -- Security Analysis of the MOR…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 308
    Published 2004
    Table of Contents: “…-Signature Scheme -- Cryptanalysis of LKK Proxy Signature -- Attack on Identity-Based Broadcasting Encryption…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 309
    Published 2006
    Table of Contents: “… Cryptanalysis of Combined Countermeasures with Randomized BSD Representations -- Amplifying Side-Channel Attacks…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 310
    Published 2001
    Table of Contents: “… -- Unconditionally-Secure Oblivious Transfer -- Cryptanalysis of the Improved User Efficient Blind Signatures…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 311
    Published 2001
    Table of Contents: “…A Few Thoughts on E-Commerce -- New CBC-MAC Forgery Attacks -- Cryptanalysis of a Public Key…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 312
    Published 2007
    Table of Contents: “… for Encryption -- Cryptanalysis of the Tiger Hash Function -- Cryptanalysis of Grindahl -- A Key Recovery Attack…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 313
  14. 314
  15. 315
  16. 316
  17. 317
    Published 2014
    Table of Contents: “… Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis -- Pragmatism vs. Elegance: comparing two…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 318
    Published 2001
    Table of Contents: “… Generation Using Human Passwords Only -- Cryptanalysis -- Cryptanalysis of RSA Signatures with Fixed-Pattern…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 319
    Published 2003
    Table of Contents: “… -- Multi-channel Attacks -- Hidden Markov Model Cryptanalysis -- Power-Analysis Attacks on an FPGA - First…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 320
    Published 2010
    Table of Contents: “… Signature Schemes -- Efficient Device-Independent Quantum Key Distribution -- Cryptanalysis -- New Generic…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search