Showing 161 - 180 results of 506 for search '"cryptanalysis"', query time: 0.09s Refine Results
  1. 161
    Published 2014
    Table of Contents: “… countermeasures -- Cryptanalysis -- Embedded system security and its implementation -- Primitives for cryptography…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 162
    Published 2012
    Table of Contents: “… -- digital signature -- cryptanalysis, efficient implementation, cryptographic application -- cryptographic…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 163
    Published 2014
    Table of Contents: “…Public key cryptanalysis -- Identity-based encryption -- Key derivation and quantum computing…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 164
    Published 2013
    Table of Contents: “… -- Cryptanalysis -- Attribute-Based Encryption -- Cryptographic Primitives and Applications.…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 165
    Published 2000
    Table of Contents: “… with Maximal Possible Nonlinearity -- Cryptanalysis I : Stream Ciphers -- Decimation Attack of Stream Ciphers…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 166
    Published 2019
    Table of Contents: “…Integrity and Cryptanalysis -- Digital Signature and MAC -- Software and Systems Security…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 167
    Table of Contents: “… decimation -- Chapter 3- Modelling through linear cellular automata -- Chapter 4- Cryptanalysis -- References.…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 168
    Published 1998
    Table of Contents: “… in groups -- Improved cryptanalysis of RC5 -- Cryptanalysis of the ANSI X9.52 CBCM mode -- Differential…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 169
    Published 2004
    Table of Contents: “…Linear Cryptanalysis -- On Multiple Linear Approximations -- Feistel Schemes and Bi-linear…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 170
    Published 2009
    Table of Contents: “…Block Ciphers -- Related-Key Cryptanalysis of the Full AES-192 and AES-256 -- The Key-Dependent…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 171
    Published 2017
    Table of Contents: “… encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 172
    Published 2017
    Table of Contents: “… encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 173
    Published 2003
    Table of Contents: “… Group Key Distribution Scheme with Decentralised User Join -- Cryptanalysis -- On a Resynchronization…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 174
    by von zur Gathen, Joachim
    Published 2015
    Table of Contents: “… curves -- C Breaking the unbreakable -- 6 Differential and linear cryptanalysis -- 7 Hash functions -- D…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 175
    Published 2007
    Table of Contents: “…Cryptanalysis I -- Practical Cryptanalysis of SFLASH -- Full Key-Recovery Attacks on HMAC/NMAC-MD4…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 176
    Published 2019
    Table of Contents: “…Attacks and Cryptanalysis -- Crypto I: Secure Computation and Storage -- Machine Learning…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 177
    Published 1997
    Table of Contents: “… cryptanalysis of language theoretic cryptosystems -- A language for specifying sequences of authorization…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 178
    Published 2019
    Table of Contents: “… Output Delivery -- Symmetric Cryptanalysis -- Efficient Collision Attack Frameworks for RIPEMD-160…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 179
    Published 2007
    Table of Contents: “… Cryptanalysis of a Higher Order Masking Scheme -- Random Number Generation and Device Identification -- High…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 180
    Published 2016
    Table of Contents: “…(Pseudo)randomness -- LPN/LWE -- Cryptanalysis -- Masking -- Fully homomorphic encryption -- Number…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search