-
321Published 2005Table of Contents: “… -- Cryptanalysis -- On Stern’s Attack Against Secret Truncated Linear Congruential Generators -- On the Success…”
Full Text via HEAL-Link
Electronic eBook -
322Published 2019Table of Contents: “…Quantum LLL with an Application to Mersenne Number Cryptosystems -- Cryptanalysis -- Breaking…”
Full Text via HEAL-Link
Electronic eBook -
323
-
324
-
325Published 2003Table of Contents: “… -- Cryptanalysis of an Algebraic Privacy Homomorphism -- Analysis of the Insecurity of ECMQV with Partially Known…”
Full Text via HEAL-Link
Electronic eBook -
326Published 2001Table of Contents: “… and Adaptive Security in Exposure-Resilient Cryptography -- Block Ciphers -- Cryptanalysis of Reduced-Round…”
Full Text via HEAL-Link
Electronic eBook -
327Published 2019Table of Contents: “… -- Improved Filter Permutators for Efficient FHE: Better Instances and Implementations -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
328Published 2006Table of Contents: “…Cryptanalysis -- Security Analysis of the Strong Diffie-Hellman Problem -- Cryptography in Theory…”
Full Text via HEAL-Link
Electronic eBook -
329Published 2006Table of Contents: “… -- Cryptanalysis -- The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions -- Breaking a New…”
Full Text via HEAL-Link
Electronic eBook -
330Published 2006Table of Contents: “… -- Cryptanalysis of Variants of UOV -- Stream Ciphers -- Trivium: A Stream Cipher Construction Inspired by Block…”
Full Text via HEAL-Link
Electronic eBook -
331Published 2009Table of Contents: “… Co-operative Architecture for Trustable Computing -- Cryptanalysis -- Security Evaluation of a DPA…”
Full Text via HEAL-Link
Electronic eBook -
332Published 2005Table of Contents: “… and CIKS-128H -- Cryptanalysis of Ake98 -- Public Key Encryption -- Designing an Efficient and Secure…”
Full Text via HEAL-Link
Electronic eBook -
333Published 2005Table of Contents: “… Cryptanalysis on SEED -- Secure and Efficient AES Software Implementation for Smart Cards -- Practical Template…”
Full Text via HEAL-Link
Electronic eBook -
334Published 2007Table of Contents: “… and Anonymous Extension -- Cryptanalysis -- Small Private-Exponent Attack on RSA with Primes Sharing Bits…”
Full Text via HEAL-Link
Electronic eBook -
335Published 2008Table of Contents: “… Signatures Out of Second-Preimage Resistant Hash Functions -- Cryptanalysis of Rational Multivariate Public…”
Full Text via HEAL-Link
Electronic eBook -
336Published 2014Table of Contents: “… for Wireless Body Area Networks -- Cryptanalysis of SIMON Variants with Connections -- Privacy-Preserving…”
Full Text via HEAL-Link
Electronic eBook -
337Published 2019Table of Contents: “… -- Chapter 6.Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-Preserving Remote User…”
Full Text via HEAL-Link
Electronic eBook -
338Published 2009Table of Contents: “… Synchronization of Chaotic Systems and Its Uses in Cryptanalysis -- Trust-Based Collaborative Control for Teams…”
Full Text via HEAL-Link
Electronic eBook -
339Published 2009Table of Contents: “… Networks with Provable Security against Differential Cryptanalysis -- Evaluating the Applicability of a Use…”
Full Text via HEAL-Link
Electronic eBook -
340