-
161Published 2014Table of Contents: “… countermeasures -- Cryptanalysis -- Embedded system security and its implementation -- Primitives for cryptography…”
Full Text via HEAL-Link
Electronic eBook -
162Published 2012Table of Contents: “… -- digital signature -- cryptanalysis, efficient implementation, cryptographic application -- cryptographic…”
Full Text via HEAL-Link
Electronic eBook -
163Published 2014Table of Contents: “…Public key cryptanalysis -- Identity-based encryption -- Key derivation and quantum computing…”
Full Text via HEAL-Link
Electronic eBook -
164Published 2013Table of Contents: “… -- Cryptanalysis -- Attribute-Based Encryption -- Cryptographic Primitives and Applications.…”
Full Text via HEAL-Link
Electronic eBook -
165Published 2000Table of Contents: “… with Maximal Possible Nonlinearity -- Cryptanalysis I : Stream Ciphers -- Decimation Attack of Stream Ciphers…”
Full Text via HEAL-Link
Electronic eBook -
166Published 2019Table of Contents: “…Integrity and Cryptanalysis -- Digital Signature and MAC -- Software and Systems Security…”
Full Text via HEAL-Link
Electronic eBook -
167Table of Contents: “… decimation -- Chapter 3- Modelling through linear cellular automata -- Chapter 4- Cryptanalysis -- References.…”
Full Text via HEAL-Link
Electronic eBook -
168Published 1998Table of Contents: “… in groups -- Improved cryptanalysis of RC5 -- Cryptanalysis of the ANSI X9.52 CBCM mode -- Differential…”
Full Text via HEAL-Link
Electronic eBook -
169Published 2004Table of Contents: “…Linear Cryptanalysis -- On Multiple Linear Approximations -- Feistel Schemes and Bi-linear…”
Full Text via HEAL-Link
Electronic eBook -
170Published 2009Table of Contents: “…Block Ciphers -- Related-Key Cryptanalysis of the Full AES-192 and AES-256 -- The Key-Dependent…”
Full Text via HEAL-Link
Electronic eBook -
171Published 2017Table of Contents: “… encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network…”
Full Text via HEAL-Link
Electronic eBook -
172Published 2017Table of Contents: “… encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network…”
Full Text via HEAL-Link
Electronic eBook -
173Published 2003Table of Contents: “… Group Key Distribution Scheme with Decentralised User Join -- Cryptanalysis -- On a Resynchronization…”
Full Text via HEAL-Link
Electronic eBook -
174by von zur Gathen, JoachimTable of Contents: “… curves -- C Breaking the unbreakable -- 6 Differential and linear cryptanalysis -- 7 Hash functions -- D…”
Published 2015
Full Text via HEAL-Link
Electronic eBook -
175Published 2007Table of Contents: “…Cryptanalysis I -- Practical Cryptanalysis of SFLASH -- Full Key-Recovery Attacks on HMAC/NMAC-MD4…”
Full Text via HEAL-Link
Electronic eBook -
176Published 2019Table of Contents: “…Attacks and Cryptanalysis -- Crypto I: Secure Computation and Storage -- Machine Learning…”
Full Text via HEAL-Link
Electronic eBook -
177Published 1997Table of Contents: “… cryptanalysis of language theoretic cryptosystems -- A language for specifying sequences of authorization…”
Full Text via HEAL-Link
Electronic eBook -
178Published 2019Table of Contents: “… Output Delivery -- Symmetric Cryptanalysis -- Efficient Collision Attack Frameworks for RIPEMD-160…”
Full Text via HEAL-Link
Electronic eBook -
179Published 2007Table of Contents: “… Cryptanalysis of a Higher Order Masking Scheme -- Random Number Generation and Device Identification -- High…”
Full Text via HEAL-Link
Electronic eBook -
180Published 2016Table of Contents: “…(Pseudo)randomness -- LPN/LWE -- Cryptanalysis -- Masking -- Fully homomorphic encryption -- Number…”
Full Text via HEAL-Link
Electronic eBook