Showing 221 - 240 results of 506 for search '"cryptanalysis"', query time: 0.12s Refine Results
  1. 221
    Published 2012
    Table of Contents: “… Universal MAC Scheme -- New Universal Hash Functions -- Cryptanalysis of TWIS Block Cipher -- RSA…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 222
    Published 2019
    Table of Contents: “… secure computation -- Signatures -- Information-theoretic cryptography -- Cryptanalysis.…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 223
    Published 2019
    Table of Contents: “… secure computation -- Signatures -- Information-theoretic cryptography -- Cryptanalysis.…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 224
    Published 2019
    Table of Contents: “… secure computation -- Signatures -- Information-theoretic cryptography -- Cryptanalysis.…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 225
    Published 2013
    Table of Contents: “… literature review -- Diophantine and Lattice Cryptanalysis of the RSA Cryptosystem -- Artificial Intelligence…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 226
    Published 2000
    Table of Contents: “… Proxy to Support Internet Content Regulation -- Cryptographic Implementation Issues -- Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 227
    Published 2003
    Table of Contents: “… Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity -- Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 228
    Published 2015
    Table of Contents: “… Transferable E-Cash -- Cryptanalysis -- Collision of Random Walks and a Refined Analysis of Attacks…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 229
    Published 2006
    Table of Contents: “…Cryptanalysis and Protocol Weaknesses -- New Attacks on RSA with Small Secret CRT-Exponents…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 230
    Published 2005
    Table of Contents: “… Number of Exponentiations -- Cryptanalysis of Public Key Cryptosystems -- An Algebraic Approach to NTRU…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 231
    by Bauer, Friedrich Ludwiq 1924-
    Published 2002
    Table of Contents: “… systems, 11.Encryption security, PART II:Cryptanalysis, 12.Exhausting combinatorial complexity, 13.Anatomy…”
    Book
  12. 232
    by Stamp, Mark
    Published 2011
    Table of Contents: “… -- Hash Functions++ -- Advanced Cryptanalysis -- Access Control. Authentication -- Authorization…”
    Full Text via HEAL-Link
    eBook
  13. 233
    Published 1999
    Table of Contents: “… Keys of HPC -- Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials -- Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 234
    Published 2012
    Table of Contents: “… -- Cryptanalysis -- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 235
    Published 2004
    Table of Contents: “… -- Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem -- Success Probability in ? 2-Attacks -- More…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 236
    Published 2018
    Table of Contents: “… for Public Key Verification -- Symmetric Ciphers and Cryptanalysis -- Speeding up MILP Aided Differential…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 237
    Published 2008
    Table of Contents: “…Invited Talks -- Cryptanalysis of the SFLASH Signature Scheme -- On the Evolution of User…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 238
    Published 2019
    Table of Contents: “… -- Obfuscation -- Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 239
    Published 2012
    Table of Contents: “… -- Cryptanalysis of Multi-Prime RSA with Small Prime Difference -- Implicit Polynomial Recovery and Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 240
    Published 2003
    Table of Contents: “… -- Cryptanalysis of the OTM Signature Scheme from FC'02 -- "Man in the Middle" Attacks on Bluetooth -- Fault Based…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search