Showing 21 - 40 results of 58 for search '"differential cryptanalysis"', query time: 0.18s Refine Results
  1. 21
    Published 2007
    Table of Contents: “… Against Masked Logic -- Advances on Access-Driven Cache Attacks on AES -- Blind Differential Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 22
    Published 2013
    Table of Contents: “… -- Differential Cryptanalysis of Keccak Variants -- Recovering Private Keys Generated with Weak PRNGs…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 23
    Published 2001
    Table of Contents: “… Differential Cryptanalysis -- Difference Distribution Attack on DONUT and Improved DONUT -- New Results…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 24
    Published 2019
    Table of Contents: “… on Stream Ciphers : Breaking BIVIUM -- Related-key Differential Cryptanalysis of Full Round CRAFT…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 25
    Published 2004
    Table of Contents: “… Against Turing -- Related-Key Differential Cryptanalysis of 192-bit Key AES Variants -- A Distinguishing…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 26
    Published 2008
    Table of Contents: “… Authentication Protocol -- Differential Cryptanalysis of Reduced-Round PRESENT -- Invited Talk -- The Psychology…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 27
    Published 2009
    Table of Contents: “… Algebraic Degree -- Algebraic Techniques in Differential Cryptanalysis -- Multidimensional Extension…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 28
    Published 2007
    Table of Contents: “… -- Cryptanalysis of SFLASH with Slightly Modified Parameters -- Differential Cryptanalysis of the Stream Ciphers Py…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 29
    Published 2010
    Table of Contents: “… Impossible Differential Cryptanalysis of 7-Round AES-128 -- Cryptanalysis of a Perturbated White-Box AES…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 30
    Published 2001
    Table of Contents: “… Interpolation Attack -- Differential Cryptanalysis of Reduced Rounds of GOST -- Practical Security Evaluation…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 31
    Published 2003
    Table of Contents: “… on Universal Hashing -- Differential Attacks -- Markov Truncated Differential Cryptanalysis of Skipjack…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 32
    Published 2003
    Table of Contents: “… Properties of the Mixing Operations of the Block Cipher IDEA -- Impossible Differential Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 33
    Published 2010
    Table of Contents: “…: Another Look on Second-Order DPA -- Block and Stream Ciphers -- Conditional Differential Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 34
    Published 2009
    Table of Contents: “… Results of Reduced-Round of CAST-128 and CAST-256 -- Improved Impossible Differential Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 35
    Published 2009
    Table of Contents: “… -- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128 -- Modes…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 36
    Published 2013
    Table of Contents: “…Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 37
    Published 2013
    Table of Contents: “… Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis.…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 38
    Published 2012
    Table of Contents: “… Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and χ2 Statistics -- Quo Vadis Quaternion…”
    Full Text via HEAL-Link
    Electronic eBook
  19. 39
    Published 2010
    Table of Contents: “…Block Ciphers -- Cryptanalysis of Reduced-Round MIBS Block Cipher -- Impossible Differential…”
    Full Text via HEAL-Link
    Electronic eBook
  20. 40
    Published 2004
    Table of Contents: “… Authentication -- Block/Stream Ciphers -- Differential Cryptanalysis of TEA and XTEA -- A Complete Divide…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search