-
221Published 2012Table of Contents: “… Universal MAC Scheme -- New Universal Hash Functions -- Cryptanalysis of TWIS Block Cipher -- RSA…”
Full Text via HEAL-Link
Electronic eBook -
222Published 2019Table of Contents: “… secure computation -- Signatures -- Information-theoretic cryptography -- Cryptanalysis.…”
Full Text via HEAL-Link
Electronic eBook -
223Published 2019Table of Contents: “… secure computation -- Signatures -- Information-theoretic cryptography -- Cryptanalysis.…”
Full Text via HEAL-Link
Electronic eBook -
224Published 2019Table of Contents: “… secure computation -- Signatures -- Information-theoretic cryptography -- Cryptanalysis.…”
Full Text via HEAL-Link
Electronic eBook -
225Artificial Intelligence, Evolutionary Computing and Metaheuristics In the Footsteps of Alan Turing /Published 2013Table of Contents: “… literature review -- Diophantine and Lattice Cryptanalysis of the RSA Cryptosystem -- Artificial Intelligence…”
Full Text via HEAL-Link
Electronic eBook -
226Published 2000Table of Contents: “… Proxy to Support Internet Content Regulation -- Cryptographic Implementation Issues -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
227Published 2003Table of Contents: “… Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
228Published 2015Table of Contents: “… Transferable E-Cash -- Cryptanalysis -- Collision of Random Walks and a Refined Analysis of Attacks…”
Full Text via HEAL-Link
Electronic eBook -
229Published 2006Table of Contents: “…Cryptanalysis and Protocol Weaknesses -- New Attacks on RSA with Small Secret CRT-Exponents…”
Full Text via HEAL-Link
Electronic eBook -
230Published 2005Table of Contents: “… Number of Exponentiations -- Cryptanalysis of Public Key Cryptosystems -- An Algebraic Approach to NTRU…”
Full Text via HEAL-Link
Electronic eBook -
231by Bauer, Friedrich Ludwiq 1924-Table of Contents: “… systems, 11.Encryption security, PART II:Cryptanalysis, 12.Exhausting combinatorial complexity, 13.Anatomy…”
Published 2002
Book -
232by Stamp, MarkTable of Contents: “… -- Hash Functions++ -- Advanced Cryptanalysis -- Access Control. Authentication -- Authorization…”
Published 2011
Full Text via HEAL-Link
eBook -
233Published 1999Table of Contents: “… Keys of HPC -- Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
234Published 2012Table of Contents: “… -- Cryptanalysis -- Efficient Dissection of Composite Problems, with Applications to Cryptanalysis, Knapsacks…”
Full Text via HEAL-Link
Electronic eBook -
235Published 2004Table of Contents: “… -- Cryptanalysis of a Knapsack Based Two-Lock Cryptosystem -- Success Probability in ? 2-Attacks -- More…”
Full Text via HEAL-Link
Electronic eBook -
236Published 2018Table of Contents: “… for Public Key Verification -- Symmetric Ciphers and Cryptanalysis -- Speeding up MILP Aided Differential…”
Full Text via HEAL-Link
Electronic eBook -
237Published 2008Table of Contents: “…Invited Talks -- Cryptanalysis of the SFLASH Signature Scheme -- On the Evolution of User…”
Full Text via HEAL-Link
Electronic eBook -
238Published 2019Table of Contents: “… -- Obfuscation -- Statistical Zeroizing Attack: Cryptanalysis of Candidates of BP Obfuscation over GGH15…”
Full Text via HEAL-Link
Electronic eBook -
239Published 2012Table of Contents: “… -- Cryptanalysis of Multi-Prime RSA with Small Prime Difference -- Implicit Polynomial Recovery and Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
240Published 2003Table of Contents: “… -- Cryptanalysis of the OTM Signature Scheme from FC'02 -- "Man in the Middle" Attacks on Bluetooth -- Fault Based…”
Full Text via HEAL-Link
Electronic eBook