-
401Published 1999Table of Contents: “…? -- On the Cryptanalysis of Nonlinear Sequences [Invited Paper] -- Securing Aeronautical Telecommunications [Invited Paper…”
Full Text via HEAL-Link
Electronic eBook -
402Published 2004Table of Contents: “…A Generalized Wiener Attack on RSA -- Cryptanalysis of a Public-Key Encryption Scheme Based…”
Full Text via HEAL-Link
Electronic eBook -
403
-
404Published 2014Table of Contents: “… for Industry Research Teams -- Cryptanalysis of Pairing-Based Cryptosystems over Small Characteristic Fields…”
Full Text via HEAL-Link
Electronic eBook -
405
-
406Published 2006Table of Contents: “… 3. Applications -- Applications of SAT Solvers to Cryptanalysis of Hash Functions -- Functional…”
Full Text via HEAL-Link
Electronic eBook -
407Published 2008Table of Contents: “… -- On Proofs of Security for DAA Schemes -- Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC 2005…”
Full Text via HEAL-Link
Electronic eBook -
408Published 2010Table of Contents: “…Cryptanalysis -- Improved Related-Key Boomerang Attacks on Round-Reduced Threefish-512 -- Integral…”
Full Text via HEAL-Link
Electronic eBook -
409Published 2010Table of Contents: “…: Another Look on Second-Order DPA -- Block and Stream Ciphers -- Conditional Differential Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
410Published 2007Table of Contents: “… Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters -- Cryptanalysis -- Related-Key…”
Full Text via HEAL-Link
Electronic eBook -
411Published 2013Table of Contents: “… Voucher Assisted Adaptive Acknowledgement Based Intrusion Detection Protocol for MANETs -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
412Published 1998Table of Contents: “… on the sphere -- The splitting number of the 4-cube -- Short and smooth polygonal paths -- Quantum cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
413Published 2004Table of Contents: “… Signatures Revisited -- Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt ‘95…”
Full Text via HEAL-Link
Electronic eBook -
414Published 2006Table of Contents: “… Identification Through Image Evaluation Using Secret Predicates -- Hash Functions -- Cryptanalysis of Reduced…”
Full Text via HEAL-Link
Electronic eBook -
415Published 2006Table of Contents: “…Stream Ciphers I -- Conditional Estimators: An Effective Attack on A5/1 -- Cryptanalysis of the F…”
Full Text via HEAL-Link
Electronic eBook -
416Published 2019Table of Contents: “…: Cryptanalysis and Countermeasures -- Analysis of Two Countermeasures against the Signal Leakage Attack…”
Full Text via HEAL-Link
Electronic eBook -
417Published 2015Table of Contents: “… Cryptanalysis Technique -- Rig: A Simple, Secure and Flexible Design for Password Hashing -- Efficient Hardware…”
Full Text via HEAL-Link
Electronic eBook -
418Published 2000Table of Contents: “… Signatures -- Cryptanalysis -- Weaknesses in the SL2( ) Hashing Scheme -- Fast Correlation Attacks through…”
Full Text via HEAL-Link
Electronic eBook -
419Published 2013Table of Contents: “… Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis.…”
Full Text via HEAL-Link
Electronic eBook -
420Published 2006Table of Contents: “… Security: Key Agreement -- Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols -- Efficient…”
Full Text via HEAL-Link
Electronic eBook