Showing 61 - 80 results of 506 for search '"cryptanalysis"', query time: 0.18s Refine Results
  1. 61
    Published 2014
    Table of Contents: “…Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 62
    Published 1999
    Table of Contents: “… -- Cryptanalysis of RC4-like Ciphers -- Cryptographic Systems -- Key Preassigned Traceability Schemes for Broadcast…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 63
    Published 2008
    Table of Contents: “… -- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms -- Cryptanalysis of the GOST Hash…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 64
  5. 65
    Published 2016
    Table of Contents: “…Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 66
    Published 2016
    Table of Contents: “…Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 67
    Published 2016
    Table of Contents: “…Provable security for symmetric cryptography -- Asymmetric cryptography and cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 68
    Published 2004
    Table of Contents: “… -- Cryptanalysis I -- A New Meet-in-the-Middle Attack on the IDEA Block Cipher -- Cryptanalysis of the Alleged…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 69
    Published 2010
    Table of Contents: “… -- Cryptographic Hash Functions: Theory and Practice -- Hash Functions -- Cryptanalysis of Tav-128 Hash Function…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 70
    Published 2009
    Table of Contents: “…-Function Cryptanalysis -- Short Chosen-Prefix Collisions for MD5 and the Creation of a Rogue CA Certificate…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 71
    Published 2018
    Table of Contents: “…Post-Quantum Cryptanalysis -- Encrypted Storage -- Symmetric-Key Constructions -- Lattice…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 72
    Published 2019
    Table of Contents: “…Public-Key Primitives -- Cryptanalysis on Public-Key Primitives -- Cryptographic Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 73
    Published 1997
    Table of Contents: “…?2 cryptanalysis of the SEAL encryption algorithm -- Partitioning cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 74
    Published 2007
    Table of Contents: “… and Efficient Constructions of Secure Designated Confirmer Signatures -- Invited Talk I -- Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 75
    Published 2005
    Table of Contents: “… with Memory -- Cryptanalysis I -- Cryptanalysis of the Quadratic Generator -- Attack the Dragon -- Two…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 76
    Published 2009
    Table of Contents: “… of Cryptographic Pairings -- Block Ciphers I -- The Cryptanalysis of Reduced-Round SMS4 -- Building Secure Block…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 77
    Published 1998
    Table of Contents: “… -- Differential collisions in SHA-0 -- From differential cryptanalysis to ciphertext-only attacks -- A simplified…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 78
    Published 2005
    Table of Contents: “…Cryptanalytic Attacks and Related Results -- The Cryptanalysis of the AES – A Brief Survey…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 79
    Published 2015
    Table of Contents: “… -- Symmetric Key Cryptanalysis -- Improved Top-Down Techniques in Differential Cryptanalysis -- Algebraic…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 80
    Published 1999
    Table of Contents: “… Cryptanalysis of RC5 and RC6 -- A Revised Version of CRYPTON: CRYPTON V1.0 -- Attack on Six Rounds of CRYPTON…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search