-
441
-
442Published 2004Table of Contents: “… from Stark Units -- Cryptanalysis of a Divisor Class Group Based Public-Key Cryptosystem.…”
Full Text via HEAL-Link
Electronic eBook -
443Published 2007Table of Contents: “… Forensics: Research and Development in Hong Kong (Invited Paper) -- Cryptanalysis -- A Linear Analysis…”
Full Text via HEAL-Link
Electronic eBook -
444Published 2018Table of Contents: “…: Cryptanalysis and Improvement of a User Authentication Scheme for SIP -- Chapter3: SECURITY AGAINST VAMPIRE…”
Full Text via HEAL-Link
Electronic eBook -
445Published 2008Table of Contents: “… under Key-Dependent Messages -- Analysis of Stream Ciphers -- Cryptanalysis of Sosemanuk and SNOW 2.0…”
Full Text via HEAL-Link
Electronic eBook -
446Published 2005Table of Contents: “… Protocols Against Online Dictionary Attacks -- Cryptanalysis of an Improved Client-to-Client Password…”
Full Text via HEAL-Link
Electronic eBook -
447Published 2009Table of Contents: “…Analysis Techniques -- A New Approach to ? 2 Cryptanalysis of Block Ciphers -- Analysis…”
Full Text via HEAL-Link
Electronic eBook -
448Published 2013Table of Contents: “… Causality Probability -- Algebra-Based Behavior Identification of Trojan Horse -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
449Published 1997Table of Contents: “… -- Linear Statistical Weakness of Alleged RC4 Keystream Generator -- Cryptanalysis of Alleged A5 Stream…”
Full Text via HEAL-Link
Electronic eBook -
450Published 2019Table of Contents: “… Signature Scheme from Lattice with Enhanced Security -- Reinterpreting and Improving the Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
451Published 2018Table of Contents: “… using conditional probabilities -- Cryptanalysis of a Random Number Generator Based on a Chaotic Ring…”
Full Text via HEAL-Link
Electronic eBook -
452Published 2004Table of Contents: “… and Gröbner Bases-Related Algebraic Cryptanalysis -- On Some Weak Extensions of AES and BES -- Clock Control…”
Full Text via HEAL-Link
Electronic eBook -
453Published 2003Table of Contents: “… Algorithm and Cryptanalysis of Toyocrypt -- Stream Ciphers & Other Primitives -- On the Efficiency…”
Full Text via HEAL-Link
Electronic eBook -
454Published 1998Table of Contents: “… -- Differential cryptanalysis of a block cipher -- On private-key cryptosystems based on product codes -- Key…”
Full Text via HEAL-Link
Electronic eBook -
455Published 2005Table of Contents: “… Synchronization Barriers -- Synchronization Fault Cryptanalysis for Breaking A5/1 -- An Efficient Algorithm…”
Full Text via HEAL-Link
Electronic eBook -
456Published 2012Table of Contents: “… Sampling Using Lazy Floating-Point Arithmetic -- Learning a Zonotope and More: Cryptanalysis of NTRUSign…”
Full Text via HEAL-Link
Electronic eBook -
457Published 2002Table of Contents: “… and Watermarking -- Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modi.ed Robust Scheme…”
Full Text via HEAL-Link
Electronic eBook -
458Published 2004Table of Contents: “… Computation -- Dining Cryptographers Revisited -- Cryptanalysis -- Algebraic Attacks and Decomposition…”
Full Text via HEAL-Link
Electronic eBook -
459Published 2006Table of Contents: “… Model -- Cryptanalysis and Implementation -- On the Effectiveness of TMTO and Exhaustive Search Attacks…”
Full Text via HEAL-Link
Electronic eBook -
460Published 2010Table of Contents: “… -- Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions -- Multi-trail…”
Full Text via HEAL-Link
Electronic eBook