Showing 121 - 140 results of 506 for search '"Cryptanalysis"', query time: 0.08s Refine Results
  1. 121
  2. 122
  3. 123
    Published 2014
    Table of Contents: “… cryptography -- Security proof frameworks -- Cryptanalysis and implementations.…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 124
    Published 2014
    Table of Contents: “…Side channel analysis -- Theory -- Block ciphers -- Cryptanalysis -- Efficient hardware design…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 125
    Published 2017
    Table of Contents: “…Post-quantum cryptography -- System security -- Public key cryptosystems -- Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 126
  7. 127
    Published 2013
    Table of Contents: “… cryptanalysis -- Key exchange and secret sharing -- Efficient implementation and hardware.- Coding theory…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 128
    Published 1999
    Table of Contents: “…Public-Key Cryptanalysis I -- On the Security of RSA Padding -- Cryptanalysis of the HFE Public Key…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 129
    Published 2005
    Table of Contents: “…Cryptanalysis I -- Cryptanalysis of the Hash Functions MD4 and RIPEMD -- How to Break MD5 and Other…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 130
    Published 2016
    Table of Contents: “…Lattices -- Elliptic curves -- Secret-key cryptanalysis -- Efficient implementations -- Secure…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 131
    Published 2014
    Table of Contents: “…Encryption -- Cryptanalysis -- Malware analysis -- Privacy and identification systems -- Types…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 132
    Published 2000
    Table of Contents: “… and Unbiased Distribution of Non-propagative Vectors -- Cryptanalysis of Block Ciphers -- Security of E2…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 133
    Published 2004
    Table of Contents: “… Cipher Cryptanalysis -- Algebraic Attacks on Summation Generators -- Algebraic Attacks on SOBER-t32…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 134
    Published 2005
    Table of Contents: “…Cryptanalysis -- A New Related Message Attack on RSA -- Breaking a Cryptographic Protocol…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 135
    Published 2018
    Table of Contents: “… -- Signatures -- Cryptanalysis -- Cryptographic primitives -- Cryptographic protocols.…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 136
    Published 2016
    Table of Contents: “…Cryptanalysis -- Cryptographic Protocols -- Network and Systems Security and Access Control…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 137
    Published 2018
    Table of Contents: “…Cryptanalysis -- Implementation Security -- Public-Key Primitives -- Security in Practice -- Secret…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 138
    Published 2016
    Table of Contents: “…System security -- Searchable encryption -- Cryptanalysis -- Permutation and symmetric encryption…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 139
  20. 140
    Published 2016
    Table of Contents: “… of Cryptographic Schemes -- Functional Encryption -- Symmetric-Key Cryptanalysis -- Foundations -- New…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search