-
121
-
122
-
123Published 2014Table of Contents: “… cryptography -- Security proof frameworks -- Cryptanalysis and implementations.…”
Full Text via HEAL-Link
Electronic eBook -
124Published 2014Table of Contents: “…Side channel analysis -- Theory -- Block ciphers -- Cryptanalysis -- Efficient hardware design…”
Full Text via HEAL-Link
Electronic eBook -
125Published 2017Table of Contents: “…Post-quantum cryptography -- System security -- Public key cryptosystems -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
126
-
127Published 2013Table of Contents: “… cryptanalysis -- Key exchange and secret sharing -- Efficient implementation and hardware.- Coding theory…”
Full Text via HEAL-Link
Electronic eBook -
128Published 1999Table of Contents: “…Public-Key Cryptanalysis I -- On the Security of RSA Padding -- Cryptanalysis of the HFE Public Key…”
Full Text via HEAL-Link
Electronic eBook -
129Published 2005Table of Contents: “…Cryptanalysis I -- Cryptanalysis of the Hash Functions MD4 and RIPEMD -- How to Break MD5 and Other…”
Full Text via HEAL-Link
Electronic eBook -
130Published 2016Table of Contents: “…Lattices -- Elliptic curves -- Secret-key cryptanalysis -- Efficient implementations -- Secure…”
Full Text via HEAL-Link
Electronic eBook -
131Published 2014Table of Contents: “…Encryption -- Cryptanalysis -- Malware analysis -- Privacy and identification systems -- Types…”
Full Text via HEAL-Link
Electronic eBook -
132Published 2000Table of Contents: “… and Unbiased Distribution of Non-propagative Vectors -- Cryptanalysis of Block Ciphers -- Security of E2…”
Full Text via HEAL-Link
Electronic eBook -
133Published 2004Table of Contents: “… Cipher Cryptanalysis -- Algebraic Attacks on Summation Generators -- Algebraic Attacks on SOBER-t32…”
Full Text via HEAL-Link
Electronic eBook -
134Published 2005Table of Contents: “…Cryptanalysis -- A New Related Message Attack on RSA -- Breaking a Cryptographic Protocol…”
Full Text via HEAL-Link
Electronic eBook -
135Published 2018Table of Contents: “… -- Signatures -- Cryptanalysis -- Cryptographic primitives -- Cryptographic protocols.…”
Full Text via HEAL-Link
Electronic eBook -
136Published 2016Table of Contents: “…Cryptanalysis -- Cryptographic Protocols -- Network and Systems Security and Access Control…”
Full Text via HEAL-Link
Electronic eBook -
137Published 2018Table of Contents: “…Cryptanalysis -- Implementation Security -- Public-Key Primitives -- Security in Practice -- Secret…”
Full Text via HEAL-Link
Electronic eBook -
138Published 2016Table of Contents: “…System security -- Searchable encryption -- Cryptanalysis -- Permutation and symmetric encryption…”
Full Text via HEAL-Link
Electronic eBook -
139
-
140Published 2016Table of Contents: “… of Cryptographic Schemes -- Functional Encryption -- Symmetric-Key Cryptanalysis -- Foundations -- New…”
Full Text via HEAL-Link
Electronic eBook