-
421
-
422Published 2014Table of Contents: “… undulation -- Chapter 2. Cryptanalysis of Multilanguage Encryption Techniques -- Chapter 3. Signcryption…”
Full Text via HEAL-Link
Electronic eBook -
423Published 2009Table of Contents: “… State Machines -- Quadratic Equations from a Kind of S-boxes -- Cryptanalysis of a Multivariate Public…”
Full Text via HEAL-Link
Electronic eBook -
424Published 2007Table of Contents: “… Are Vulnerable to Power Attacks -- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic…”
Full Text via HEAL-Link
Electronic eBook -
425Published 2007Table of Contents: “… Computation of DNF -- Cryptanalysis -- Square Like Attack on Camellia -- Differential Fault Analysis on CLEFIA…”
Full Text via HEAL-Link
Electronic eBook -
426Published 2008Table of Contents: “… Polynomial Systems -- Cryptology -- Some Mathematical Problems in Cryptanalysis -- A Reduction Attack…”
Full Text via HEAL-Link
Electronic eBook -
427Published 2012Table of Contents: “…Security on LBlock against Biclique Cryptanalysis -- Improved Impossible Differential Attacks…”
Full Text via HEAL-Link
Electronic eBook -
428Published 2019Table of Contents: “…-Checkable Encryption -- Improved Cryptanalysis of the KMOV Elliptic Curve Cryptosystem -- Hierarchical…”
Full Text via HEAL-Link
Electronic eBook -
429Published 2006Table of Contents: “…Digital Signature Schemes -- Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings…”
Full Text via HEAL-Link
Electronic eBook -
430Published 2005Table of Contents: “… on Zero-Knowledge Proofs -- Cryptanalysis of a Wavelet Based Watermarking Scheme -- A Generalized Method…”
Full Text via HEAL-Link
Electronic eBook -
431Published 2018Table of Contents: “…. Cryptanalysis of Protocol for Enhanced Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography…”
Full Text via HEAL-Link
Electronic eBook -
432Published 2012Table of Contents: “… -- Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader -- Cryptanalysis of Goriparthi…”
Full Text via HEAL-Link
Electronic eBook -
433Published 2015Table of Contents: “… Encryption -- Cryptanalysis of Ascon -- Detecting and Tracing Malicious Activities Stronger Security Notions…”
Full Text via HEAL-Link
Electronic eBook -
434Published 2003Table of Contents: “… Extenders for UOWHF -- Cryptanalysis of 3-Pass HAVAL -- Group Signatures -- Efficient Group Signatures…”
Full Text via HEAL-Link
Electronic eBook -
435Published 2004Table of Contents: “… Authentication -- Block/Stream Ciphers -- Differential Cryptanalysis of TEA and XTEA -- A Complete Divide…”
Full Text via HEAL-Link
Electronic eBook -
436Published 2008Table of Contents: “… Cryptanalysis of A5/2 -- A Logic for Inclusion of Administrative Domains and Administrators in Multi-domain…”
Full Text via HEAL-Link
Electronic eBook -
437Published 2009Table of Contents: “… -- Cryptanalysis of Two Ring Signcryption Schemes -- Efficient Signcryption Key Encapsulation without Random…”
Full Text via HEAL-Link
Electronic eBook -
438Published 2017Table of Contents: “… And Its Applications to Algebraic Cryptanalysis -- Accountable Storage -- Maliciously Secure Multi-Client…”
Full Text via HEAL-Link
Electronic eBook -
439Published 2009Table of Contents: “… -- Cryptanalysis of Mu et al.’s and Li et al.’s Schemes and a Provably Secure ID-Based Broadcast Signcryption…”
Full Text via HEAL-Link
Electronic eBook -
440Published 2008Table of Contents: “… Division Are Decidable in Polynomial Time -- Cryptanalysis of Stickel’s Key Exchange Scheme…”
Full Text via HEAL-Link
Electronic eBook