-
461Published 2003Table of Contents: “…-Knowledge Identification Scheme Based on an Average-Case NP-Complete Problem -- Linear Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
462Published 2019Table of Contents: “… Cryptanalysis of DES-like Ciphers -- Secure Generators of q-valued Pseudo-random Sequences on Arithmetic…”
Full Text via HEAL-Link
Electronic eBook -
463
-
464Published 2006Table of Contents: “… Cryptanalysis of MAG -- On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions -- Network…”
Full Text via HEAL-Link
Electronic eBook -
465Published 2009Table of Contents: “… Cryptanalysis of Two Time Pads -- A Reconfigurable and Modular Open Architecture Controller: The New Frontiers…”
Full Text via HEAL-Link
Electronic eBook -
466Published 2005Table of Contents: “…) -- Cryptanalysis of a Particular Case of Klimov-Shamir Pseudo-Random Generator -- Generating Functions Associated…”
Full Text via HEAL-Link
Electronic eBook -
467
-
468
-
469
-
470Published 2003Table of Contents: “… Party -- Using OCSP to Secure Certificate-Using Transactions in M-commerce -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
471Published 2001Table of Contents: “…) -- Cryptanalysis -- Attacks on Cryptoprocessor Transaction Sets -- Bandwidth-Optimal Kleptographic Attacks…”
Full Text via HEAL-Link
Electronic eBook -
472Published 2005Table of Contents: “… Through Correlation-Based Hybrid Feature Selection -- Protocol Cryptanalysis -- Security Analysis of Three…”
Full Text via HEAL-Link
Electronic eBook -
473Published 2004Table of Contents: “… Attacks on Koblitz Curves -- Constructing and Cryptanalysis of a 16 × 16 Binary Matrix as a Diffusion…”
Full Text via HEAL-Link
Electronic eBook -
474Published 2019Table of Contents: “… Tunneling Detection method based on Deep Learning models to prevent Data Exfiltration -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
475Published 2007Table of Contents: “… Distributed Computing Environment -- Covert Channel for Improving VoIP Security -- Cryptanalysis of Chaotic…”
Full Text via HEAL-Link
Electronic eBook -
476Published 2018Table of Contents: “… -- Relation Clustering -- Cryptanalysis of Salsa and ChaCha: Revisited -- CloudShare: Towards a Cost-Efficient…”
Full Text via HEAL-Link
Electronic eBook -
477Published 2000Table of Contents: “… Systems -- An Interactive Cryptanalysis Algorithm for the Vigenere Cipher -- Mappings and Interoperability…”
Full Text via HEAL-Link
Electronic eBook -
478Published 2015Table of Contents: “…. Climent et al -- 12 Variations on Minimal Linear Codes: G. Cohen and S. Mesnager -- 13 Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
479Published 2015Table of Contents: “… Improvements in Glowworm Swarm Optimization can Solve Real Life Problems -- Cryptanalysis of Transposition…”
Full Text via HEAL-Link
Electronic eBook -
480Published 2008Table of Contents: “… Cryptography on Graphs -- Algebraic Cryptanalysis of CTRU Cryptosystem -- Computational Biology…”
Full Text via HEAL-Link
Electronic eBook