Showing 141 - 160 results of 506 for search '"cryptanalysis"', query time: 0.11s Refine Results
  1. 141
    Published 2016
    Table of Contents: “…Digital signatures -- Public-key cryptography -- Block cipher cryptanalysis.-Elliptic curve…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 142
  3. 143
    Published 2017
    Table of Contents: “… -- Cryptanalysis -- Cryptographic implementations -- Authentication using bio and ML -- Authentication -- ICT…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 144
    Published 2014
    Table of Contents: “… computation - foundations and algorithms -- Network security -- Functional encryption -- Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 145
    Published 2014
    Table of Contents: “…Chosen ciphertext security.- Re-encryption -- Verifiable outsourcing -- Cryptanalysis -- Identity…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 146
    Published 2017
    Table of Contents: “…Post-Quantum Cryptography -- Symmetric Key Cryptanalysis -- Lattices -- Homomorphic Encryptions…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 147
    Published 2018
    Table of Contents: “…Code-based Cryptography -- Cryptanalysis -- Hash-based Cryptography -- Isogenies in Cryptography…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 148
    Published 2019
    Table of Contents: “…Cryptocurrency Cryptanalysis -- Measurement -- Payment Protocol Security -- Multiparty Protocols…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 149
    Published 2003
    Table of Contents: “… Random Elliptic Curves in Cryptography -- Cryptanalysis of the Full Version Randomized Addition…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 150
    Published 1998
    Table of Contents: “… Curve Discrete Logarithms and the Index Calculus -- Cryptanalysis 1 -- Cryptanalysis of Rijmen-Preneel…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 151
    Published 1997
    Table of Contents: “…-Hellman revisited: A cryptanalysis of the Qu-Vanstone cryptosystem based on group factorizations…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 152
    Published 2006
    Table of Contents: “… -- Symmetric Key Cryptanalysis and Randomness -- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 153
    Published 2009
    Table of Contents: “… -- Cryptanalysis I -- Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT -- Saturation Attack…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 154
    Published 2013
    Table of Contents: “…Lattices and FHE -- Foundations of Hardness -- Cryptanalysis -- New Directions -- Leakage…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 155
    Published 2007
    Table of Contents: “… -- Cryptanalysis of SFLASH with Slightly Modified Parameters -- Differential Cryptanalysis of the Stream Ciphers Py…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 156
    Published 2013
    Table of Contents: “… Based on Small-Bias Probability Spaces -- Cryptanalysis -- Differential Power Analysis of MAC-Keccak…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 157
    Published 2017
    Table of Contents: “… -- Social interaction and policy -- Cryptanalysis -- Surveillance and anonymity -- Web security and data…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 158
    Published 2017
    Table of Contents: “…Cryptanalysis, Protocols -- Encrpytion Schemes -- Leakage-Resilient and Non-Malleable Codes…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 159
    Published 2013
    Table of Contents: “…Attack and defense -- Software and Web security -- Cryptanalysis -- Cryptographic protocol…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 160
    Published 2017
    Table of Contents: “…Cryptanalysis, Protocols -- Encryption Schemes -- Leakage-Resilient and Non-Malleable Codes…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search