-
21Published 2007Table of Contents: “… Against Masked Logic -- Advances on Access-Driven Cache Attacks on AES -- Blind Differential Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
22Published 2013Table of Contents: “… -- Differential Cryptanalysis of Keccak Variants -- Recovering Private Keys Generated with Weak PRNGs…”
Full Text via HEAL-Link
Electronic eBook -
23Published 2001Table of Contents: “… Differential Cryptanalysis -- Difference Distribution Attack on DONUT and Improved DONUT -- New Results…”
Full Text via HEAL-Link
Electronic eBook -
24Published 2019Table of Contents: “… on Stream Ciphers : Breaking BIVIUM -- Related-key Differential Cryptanalysis of Full Round CRAFT…”
Full Text via HEAL-Link
Electronic eBook -
25Published 2004Table of Contents: “… Against Turing -- Related-Key Differential Cryptanalysis of 192-bit Key AES Variants -- A Distinguishing…”
Full Text via HEAL-Link
Electronic eBook -
26Published 2008Table of Contents: “… Authentication Protocol -- Differential Cryptanalysis of Reduced-Round PRESENT -- Invited Talk -- The Psychology…”
Full Text via HEAL-Link
Electronic eBook -
27Published 2009Table of Contents: “… Algebraic Degree -- Algebraic Techniques in Differential Cryptanalysis -- Multidimensional Extension…”
Full Text via HEAL-Link
Electronic eBook -
28Published 2007Table of Contents: “… -- Cryptanalysis of SFLASH with Slightly Modified Parameters -- Differential Cryptanalysis of the Stream Ciphers Py…”
Full Text via HEAL-Link
Electronic eBook -
29Published 2010Table of Contents: “… Impossible Differential Cryptanalysis of 7-Round AES-128 -- Cryptanalysis of a Perturbated White-Box AES…”
Full Text via HEAL-Link
Electronic eBook -
30Published 2001Table of Contents: “… Interpolation Attack -- Differential Cryptanalysis of Reduced Rounds of GOST -- Practical Security Evaluation…”
Full Text via HEAL-Link
Electronic eBook -
31Published 2003Table of Contents: “… on Universal Hashing -- Differential Attacks -- Markov Truncated Differential Cryptanalysis of Skipjack…”
Full Text via HEAL-Link
Electronic eBook -
32Published 2003Table of Contents: “… Properties of the Mixing Operations of the Block Cipher IDEA -- Impossible Differential Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
33Published 2010Table of Contents: “…: Another Look on Second-Order DPA -- Block and Stream Ciphers -- Conditional Differential Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
34Published 2009Table of Contents: “… Results of Reduced-Round of CAST-128 and CAST-256 -- Improved Impossible Differential Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
35Published 2009Table of Contents: “… -- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128 -- Modes…”
Full Text via HEAL-Link
Electronic eBook -
36Published 2013Table of Contents: “…Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A…”
Full Text via HEAL-Link
Electronic eBook -
37Published 2013Table of Contents: “… Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis.…”
Full Text via HEAL-Link
Electronic eBook -
38Published 2012Table of Contents: “… Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and χ2 Statistics -- Quo Vadis Quaternion…”
Full Text via HEAL-Link
Electronic eBook -
39Published 2010Table of Contents: “…Block Ciphers -- Cryptanalysis of Reduced-Round MIBS Block Cipher -- Impossible Differential…”
Full Text via HEAL-Link
Electronic eBook -
40Published 2004Table of Contents: “… Authentication -- Block/Stream Ciphers -- Differential Cryptanalysis of TEA and XTEA -- A Complete Divide…”
Full Text via HEAL-Link
Electronic eBook