-
41Published 1998Table of Contents: “…Cryptanalysis I -- New Results in Linear Cryptanalysis of RC5 -- Higher Order Differential Attack…”
Full Text via HEAL-Link
Electronic eBook -
42Published 2009Table of Contents: “…Hash Functions I -- Practical Collisions for SHAMATA-256 -- Improved Cryptanalysis of the Reduced…”
Full Text via HEAL-Link
Electronic eBook -
43Published 2013Table of Contents: “…Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A…”
Full Text via HEAL-Link
Electronic eBook -
44Published 2001Table of Contents: “…Specific Stream-Cipher Cryptanalysis -- Real Time Cryptanalysis of A5/1 on a PC -- Statistical…”
Full Text via HEAL-Link
Electronic eBook -
45Published 2011Table of Contents: “… -- 7. Cryptanalysis of chaotic ciphers -- 8. Lessons learnt from the cryptanalysis of chaos-based…”
Full Text via HEAL-Link
Electronic eBook -
46Published 2010Table of Contents: “…Stream Ciphers and Block Ciphers -- Cryptanalysis of the DECT Standard Cipher -- Improving…”
Full Text via HEAL-Link
Electronic eBook -
47Published 2003Table of Contents: “…Block Cipher Cryptanalysis -- Cryptanalysis of IDEA-X/2 -- Differential-Linear Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
48Published 2009Table of Contents: “… -- Resettably Secure Computation -- On the Security Loss in Cryptographic Reductions -- Hash Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
49Published 2008Table of Contents: “…Hash Function Cryptanalysis -- Security of MD5 Challenge and Response: Extension of APOP Password…”
Full Text via HEAL-Link
Electronic eBook -
50Published 2017Table of Contents: “… in cryptanalysis -- Primitives and features; cryptanalysis correspondence.…”
Full Text via HEAL-Link
Electronic eBook -
51Published 2012Table of Contents: “…Block ciphers -- Differential cryptanalysis -- Hash functions -- Modes of operation -- New tools…”
Full Text via HEAL-Link
Electronic eBook -
52Published 2002Table of Contents: “…Cryptanalysis I -- Cryptanalysis of a Pseudorandom Generator Based on Braid Groups -- Potential…”
Full Text via HEAL-Link
Electronic eBook -
53Published 2009Table of Contents: “… Functions Analysis I -- Cryptanalysis of RadioGatún -- Preimage Attacks on Reduced Tiger and SHA-2…”
Full Text via HEAL-Link
Electronic eBook -
54Published 2013Table of Contents: “…-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage…”
Full Text via HEAL-Link
Electronic eBook -
55Published 2013Table of Contents: “…-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage…”
Full Text via HEAL-Link
Electronic eBook -
56Published 2015Table of Contents: “…Cryptanalysis of the Multilinear Map over the Integers -- Robust Authenticated-Encryption AEZ…”
Full Text via HEAL-Link
Electronic eBook -
57Published 2015Table of Contents: “… and IO -- Pseudorandomness -- Block cipher cryptanalysis -- Integrity -- Assumptions -- Hash functions…”
Full Text via HEAL-Link
Electronic eBook -
58Published 2015Table of Contents: “… and IO -- Pseudorandomness -- Block cipher cryptanalysis -- Integrity -- Assumptions -- Hash functions…”
Full Text via HEAL-Link
Electronic eBook -
59Published 2010Table of Contents: “…Cryptanalysis of Multivariate Systems -- Properties of the Discrete Differential with Cryptographic…”
Full Text via HEAL-Link
Electronic eBook -
60Published 2014Table of Contents: “…Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side…”
Full Text via HEAL-Link
Electronic eBook