-
141Published 2016Table of Contents: “…Digital signatures -- Public-key cryptography -- Block cipher cryptanalysis.-Elliptic curve…”
Full Text via HEAL-Link
Electronic eBook -
142
-
143Published 2017Table of Contents: “… -- Cryptanalysis -- Cryptographic implementations -- Authentication using bio and ML -- Authentication -- ICT…”
Full Text via HEAL-Link
Electronic eBook -
144Published 2014Table of Contents: “… computation - foundations and algorithms -- Network security -- Functional encryption -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
145Published 2014Table of Contents: “…Chosen ciphertext security.- Re-encryption -- Verifiable outsourcing -- Cryptanalysis -- Identity…”
Full Text via HEAL-Link
Electronic eBook -
146Published 2017Table of Contents: “…Post-Quantum Cryptography -- Symmetric Key Cryptanalysis -- Lattices -- Homomorphic Encryptions…”
Full Text via HEAL-Link
Electronic eBook -
147Published 2018Table of Contents: “…Code-based Cryptography -- Cryptanalysis -- Hash-based Cryptography -- Isogenies in Cryptography…”
Full Text via HEAL-Link
Electronic eBook -
148Published 2019Table of Contents: “…Cryptocurrency Cryptanalysis -- Measurement -- Payment Protocol Security -- Multiparty Protocols…”
Full Text via HEAL-Link
Electronic eBook -
149Published 2003Table of Contents: “… Random Elliptic Curves in Cryptography -- Cryptanalysis of the Full Version Randomized Addition…”
Full Text via HEAL-Link
Electronic eBook -
150Published 1998Table of Contents: “… Curve Discrete Logarithms and the Index Calculus -- Cryptanalysis 1 -- Cryptanalysis of Rijmen-Preneel…”
Full Text via HEAL-Link
Electronic eBook -
151Published 1997Table of Contents: “…-Hellman revisited: A cryptanalysis of the Qu-Vanstone cryptosystem based on group factorizations…”
Full Text via HEAL-Link
Electronic eBook -
152Published 2006Table of Contents: “… -- Symmetric Key Cryptanalysis and Randomness -- On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA…”
Full Text via HEAL-Link
Electronic eBook -
153Published 2009Table of Contents: “… -- Cryptanalysis I -- Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT -- Saturation Attack…”
Full Text via HEAL-Link
Electronic eBook -
154Published 2013Table of Contents: “…Lattices and FHE -- Foundations of Hardness -- Cryptanalysis -- New Directions -- Leakage…”
Full Text via HEAL-Link
Electronic eBook -
155Published 2007Table of Contents: “… -- Cryptanalysis of SFLASH with Slightly Modified Parameters -- Differential Cryptanalysis of the Stream Ciphers Py…”
Full Text via HEAL-Link
Electronic eBook -
156Published 2013Table of Contents: “… Based on Small-Bias Probability Spaces -- Cryptanalysis -- Differential Power Analysis of MAC-Keccak…”
Full Text via HEAL-Link
Electronic eBook -
157Published 2017Table of Contents: “… -- Social interaction and policy -- Cryptanalysis -- Surveillance and anonymity -- Web security and data…”
Full Text via HEAL-Link
Electronic eBook -
158Published 2017Table of Contents: “…Cryptanalysis, Protocols -- Encrpytion Schemes -- Leakage-Resilient and Non-Malleable Codes…”
Full Text via HEAL-Link
Electronic eBook -
159Published 2013Table of Contents: “…Attack and defense -- Software and Web security -- Cryptanalysis -- Cryptographic protocol…”
Full Text via HEAL-Link
Electronic eBook -
160Published 2017Table of Contents: “…Cryptanalysis, Protocols -- Encryption Schemes -- Leakage-Resilient and Non-Malleable Codes…”
Full Text via HEAL-Link
Electronic eBook