Showing 321 - 340 results of 506 for search '"Cryptanalysis"', query time: 0.31s Refine Results
  1. 321
    Published 2005
    Table of Contents: “… -- Cryptanalysis -- On Stern’s Attack Against Secret Truncated Linear Congruential Generators -- On the Success…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 322
    Published 2019
    Table of Contents: “…Quantum LLL with an Application to Mersenne Number Cryptosystems -- Cryptanalysis -- Breaking…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 323
  4. 324
  5. 325
    Published 2003
    Table of Contents: “… -- Cryptanalysis of an Algebraic Privacy Homomorphism -- Analysis of the Insecurity of ECMQV with Partially Known…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 326
    Published 2001
    Table of Contents: “… and Adaptive Security in Exposure-Resilient Cryptography -- Block Ciphers -- Cryptanalysis of Reduced-Round…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 327
    Published 2019
    Table of Contents: “… -- Improved Filter Permutators for Efficient FHE: Better Instances and Implementations -- Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 328
    Published 2006
    Table of Contents: “…Cryptanalysis -- Security Analysis of the Strong Diffie-Hellman Problem -- Cryptography in Theory…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 329
    Published 2006
    Table of Contents: “… -- Cryptanalysis -- The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions -- Breaking a New…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 330
    Published 2006
    Table of Contents: “… -- Cryptanalysis of Variants of UOV -- Stream Ciphers -- Trivium: A Stream Cipher Construction Inspired by Block…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 331
    Published 2009
    Table of Contents: “… Co-operative Architecture for Trustable Computing -- Cryptanalysis -- Security Evaluation of a DPA…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 332
    Published 2005
    Table of Contents: “… and CIKS-128H -- Cryptanalysis of Ake98 -- Public Key Encryption -- Designing an Efficient and Secure…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 333
    Published 2005
    Table of Contents: “… Cryptanalysis on SEED -- Secure and Efficient AES Software Implementation for Smart Cards -- Practical Template…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 334
    Published 2007
    Table of Contents: “… and Anonymous Extension -- Cryptanalysis -- Small Private-Exponent Attack on RSA with Primes Sharing Bits…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 335
    Published 2008
    Table of Contents: “… Signatures Out of Second-Preimage Resistant Hash Functions -- Cryptanalysis of Rational Multivariate Public…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 336
    Published 2014
    Table of Contents: “… for Wireless Body Area Networks -- Cryptanalysis of SIMON Variants with Connections -- Privacy-Preserving…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 337
    Published 2019
    Table of Contents: “… -- Chapter 6.Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 338
    Published 2009
    Table of Contents: “… Synchronization of Chaotic Systems and Its Uses in Cryptanalysis -- Trust-Based Collaborative Control for Teams…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 339
    Published 2009
    Table of Contents: “… Networks with Provable Security against Differential Cryptanalysis -- Evaluating the Applicability of a Use…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 340
Search Tools: RSS Feed Email Search