Showing 341 - 360 results of 506 for search '"cryptanalysis"', query time: 0.13s Refine Results
  1. 341
    Published 2006
    Table of Contents: “… in Pervasive Computing -- Cryptanalysis of the Energy Efficient Stream Ciphers SSC2 -- ARMS: An Authenticated…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 342
    by Dooley, John F.
    Published 2013
    Full Text via HEAL-Link
    Electronic eBook
  3. 343
    Published 2001
    Table of Contents: “…Lattice Based Cryptography -- Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 344
    Published 2019
    Table of Contents: “… Resource Management Technique in Grid -- Cryptanalysis of a Chaotic Key based Image Encryption Scheme…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 345
    Published 2013
    Table of Contents: “… -- Cryptanalysis of Helix and Phelix Revisited -- Toward Separating the Strong Adaptive Pseudo-Freeness from…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 346
  7. 347
  8. 348
  9. 349
    Published 2009
    Full Text via HEAL-Link
    Electronic eBook
  10. 350
    Published 2004
    Table of Contents: “… Integrity Idealization -- Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 351
    Published 2002
    Table of Contents: “… -- Cryptanalysis of Unbalanced RSA with Small CRT-Exponent -- Information Theory and Secret Sharing -- Hyper…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 352
    Published 2001
    Table of Contents: “… Importance in the Cryptanalysis of the RSA -- A New Undeniable Signature Scheme Using Smart Cards -- Non…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 353
    Published 2001
    Table of Contents: “… of Elliptic Curve Cryptosystems on an ARM7 with Hardware Accelerator -- Cryptanalysis and Prevention -- A…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 354
    Published 2014
    Table of Contents: “… -- Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 355
    Published 2007
    Table of Contents: “… Scheme for Multiple Receivers -- Identity-Based Proxy Signature from Pairings -- Cryptanalysis of BGW…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 356
    Published 2010
    Table of Contents: “… Detection for Enhanced RFID Security and Privacy without Changing the Usage Model -- Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 357
    Published 2005
    Table of Contents: “… Cryptography: Kleptographic Aspects -- Cryptanalysis -- Resistance of SNOW 2.0 Against Algebraic Attacks -- A…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 358
    Published 2005
    Full Text via HEAL-Link
    Electronic eBook
  19. 359
  20. 360
Search Tools: RSS Feed Email Search