-
1Published 2018Table of Contents: “… Preserving Encryption -- Fault Attacks and Hash Functions -- Post Quantum Cryptography -- Asymmetric Key…”
Full Text via HEAL-Link
Electronic eBook -
2Published 2018Table of Contents: “…-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing…”
Full Text via HEAL-Link
Electronic eBook -
3Published 2018Table of Contents: “…-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing…”
Full Text via HEAL-Link
Electronic eBook -
4Published 2018Table of Contents: “…-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing…”
Full Text via HEAL-Link
Electronic eBook -
5Published 2018Table of Contents: “… Storage Protection of Community Medical Internet of Things -- Generalized Format-preserving Encryption…”
Full Text via HEAL-Link
Electronic eBook -
6Published 2014Table of Contents: “…-Preserving Encryption Algorithms for Critical Infrastructure Protection -- Asynchronous Binary Byzantine…”
Full Text via HEAL-Link
Electronic eBook -
7Published 2017Table of Contents: “… with Minimum Faults -- eSPF: A Family of Format-Preserving Encryption Algorithms Using MDS Matrices…”
Full Text via HEAL-Link
Electronic eBook -
8Published 2009Table of Contents: “… of Operation -- Format-Preserving Encryption -- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic…”
Full Text via HEAL-Link
Electronic eBook -
9Published 2015Table of Contents: “… -- How Much Can Complexity of Linear Cryptanalysis Be Reduced? -- Format-Preserving Encryption Algorithms…”
Full Text via HEAL-Link
Electronic eBook