-
101Published 2017Table of Contents: “…Public Key Implementations -- Lattice-based Cryptanalysis -- Fault and Glitch Resistant…”
Full Text via HEAL-Link
Electronic eBook -
102Published 2014Table of Contents: “…Cryptanalysis -- Cryptographic protocols -- Fine-grain cryptographic protocols -- Key exchange…”
Full Text via HEAL-Link
Electronic eBook -
103Published 2004Table of Contents: “… Sharing -- NGSCB: A Trusted Open System -- Cryptanalysis (I) -- The Biryukov-Demirci Attack on Reduced…”
Full Text via HEAL-Link
Electronic eBook -
104Published 2021“…, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous…”
Get full text
-
105Published 2018Table of Contents: “…Symmetric-Key Cryptanalysis -- Public Key and Identity-Based Encryption -- Side-Channels…”
Full Text via HEAL-Link
Electronic eBook -
106Published 2010Table of Contents: “…Symmetric Key Encryption -- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure…”
Full Text via HEAL-Link
Electronic eBook -
107Published 2010Table of Contents: “… on One-Way Permutations -- Cryptanalysis of Symmetric Primitives -- Message Recovery and Pseudo-preimage…”
Full Text via HEAL-Link
Electronic eBook -
108Published 2007Table of Contents: “… -- Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
109Published 2012Table of Contents: “… -- Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability -- Slide Cryptanalysis of Lightweight…”
Full Text via HEAL-Link
Electronic eBook -
110Published 2012Table of Contents: “…Cryptanalysis -- Network security -- Cryptographic protocols -- Encryption -- S-box theory.…”
Full Text via HEAL-Link
Electronic eBook -
111Published 2002Table of Contents: “… Cryptanalysis -- Threshold Cryptosystems Based on Factoring -- Non-interactive Distributed-Verifier Proofs…”
Full Text via HEAL-Link
Electronic eBook -
112Published 2010Table of Contents: “… Cryptanalysis and Stream Cipher -- Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared…”
Full Text via HEAL-Link
Electronic eBook -
113Published 2019Table of Contents: “…Award Papers -- Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality -- Quantum…”
Full Text via HEAL-Link
Electronic eBook -
114Published 2014Table of Contents: “… Attacks on Reduced-Round Stribog -- Secret-Key Cryptanalysis -- Breaking the IOC Authenticated Encryption…”
Full Text via HEAL-Link
Electronic eBook -
115Published 2015Table of Contents: “…Symmetric cryptanalysis -- Public key cryptography -- Identity-based encryption -- Digital…”
Full Text via HEAL-Link
Electronic eBook -
116Published 2016Table of Contents: “… Protocols -- Outsourcing Computation -- Digital Signatures -- Cryptanalysis -- Two-party Computation…”
Full Text via HEAL-Link
Electronic eBook -
117Published 2015Table of Contents: “…Public key encryption -- Cryptanalysis -- Side channel attacks -- Information theoretic…”
Full Text via HEAL-Link
Electronic eBook -
118Published 2015Table of Contents: “…Designs -- Cryptanalysis -- Authenticated encryption -- Foundations and theory -- Stream ciphers…”
Full Text via HEAL-Link
Electronic eBook -
119Published 2013Table of Contents: “…Cryptanalysis -- Zero-Knowledge Protocols -- Distributed Protocols -- Network Security…”
Full Text via HEAL-Link
Electronic eBook -
120Published 2014Table of Contents: “… -- Cryptanalysis and attacks (symmetric cryptography) -- Network security -- Signatures -- System security.- Secure…”
Full Text via HEAL-Link
Electronic eBook