-
61Published 2014Table of Contents: “…Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side…”
Full Text via HEAL-Link
Electronic eBook -
62Published 1999Table of Contents: “… -- Cryptanalysis of RC4-like Ciphers -- Cryptographic Systems -- Key Preassigned Traceability Schemes for Broadcast…”
Full Text via HEAL-Link
Electronic eBook -
63Published 2008Table of Contents: “… -- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms -- Cryptanalysis of the GOST Hash…”
Full Text via HEAL-Link
Electronic eBook -
64
-
65Published 2016Table of Contents: “…Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
66Published 2016Table of Contents: “…Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
67Published 2016Table of Contents: “…Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
68Published 2004Table of Contents: “… -- Cryptanalysis I -- A New Meet-in-the-Middle Attack on the IDEA Block Cipher -- Cryptanalysis of the Alleged…”
Full Text via HEAL-Link
Electronic eBook -
69Published 2010Table of Contents: “… -- Cryptographic Hash Functions: Theory and Practice -- Hash Functions -- Cryptanalysis of Tav-128 Hash Function…”
Full Text via HEAL-Link
Electronic eBook -
70Published 2009Table of Contents: “…-Function Cryptanalysis -- Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate…”
Full Text via HEAL-Link
Electronic eBook -
71Published 2018Table of Contents: “…Post-Quantum Cryptanalysis -- Encrypted Storage -- Symmetric-Key Constructions -- Lattice…”
Full Text via HEAL-Link
Electronic eBook -
72Published 2019Table of Contents: “…Public-Key Primitives -- Cryptanalysis on Public-Key Primitives -- Cryptographic Protocols…”
Full Text via HEAL-Link
Electronic eBook -
73Published 1997Table of Contents: “…?2 cryptanalysis of the SEAL encryption algorithm -- Partitioning cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
74Published 2007Table of Contents: “… and Efficient Constructions of Secure Designated Confirmer Signatures -- Invited Talk I -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
75Published 2005Table of Contents: “… with Memory -- Cryptanalysis I -- Cryptanalysis of the Quadratic Generator -- Attack the Dragon -- Two…”
Full Text via HEAL-Link
Electronic eBook -
76Published 2009Table of Contents: “… of Cryptographic Pairings -- Block Ciphers I -- The Cryptanalysis of Reduced-Round SMS4 -- Building Secure Block…”
Full Text via HEAL-Link
Electronic eBook -
77Published 1998Table of Contents: “… -- Differential collisions in SHA-0 -- From differential cryptanalysis to ciphertext-only attacks -- A simplified…”
Full Text via HEAL-Link
Electronic eBook -
78Published 2005Table of Contents: “…Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey…”
Full Text via HEAL-Link
Electronic eBook -
79Published 2015Table of Contents: “… -- Symmetric Key Cryptanalysis -- Improved Top-Down Techniques in Differential Cryptanalysis -- Algebraic…”
Full Text via HEAL-Link
Electronic eBook -
80Published 1999Table of Contents: “… Cryptanalysis of RC5 and RC6 -- A Revised Version of CRYPTON: CRYPTON V1.0 -- Attack on Six Rounds of CRYPTON…”
Full Text via HEAL-Link
Electronic eBook