Showing 41 - 58 results of 58 for search '"differential cryptanalysis"', query time: 0.12s Refine Results
  1. 41
    Published 2008
    Table of Contents: “… Adversary -- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers -- Multidimensional…”
    Full Text via HEAL-Link
    Electronic eBook
  2. 42
    Published 2008
    Table of Contents: “… -- Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent -- Impossible Differential…”
    Full Text via HEAL-Link
    Electronic eBook
  3. 43
    Published 2019
    Table of Contents: “… -- Impossible Differential Cryptanalysis of SPECK -- Detect Peer-To-Peer Botnet with Permutation Entropy…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 44
    Published 2008
    Table of Contents: “… Exchange -- Cryptanalysis -- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 45
    Published 1999
    Table of Contents: “… Keys of HPC -- Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials -- Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 46
    Published 1998
    Table of Contents: “… -- Differential collisions in SHA-0 -- From differential cryptanalysis to ciphertext-only attacks -- A simplified…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 47
    Published 2002
    Table of Contents: “… -- Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 48
    Published 2003
    Table of Contents: “… of Differential Cryptanalysis in Abelian Groups -- Authorization -- Trust and Authorization in Pervasive B2E…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 49
    Published 1998
    Table of Contents: “… -- Differential cryptanalysis of a block cipher -- On private-key cryptosystems based on product codes -- Key…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 50
    Published 2001
    Table of Contents: “… Differential Cryptanalysis -- Known-IV Attacks on Triple Modes of Operation of Block Ciphers -- Generic Attacks…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 51
    Published 2010
    Table of Contents: “… -- Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions -- Multi-trail…”
    Full Text via HEAL-Link
    Electronic eBook
  12. 52
    Published 2005
    Table of Contents: “… Computation with Optimal Resilience -- Algebra and Number Theory II -- Differential Cryptanalysis…”
    Full Text via HEAL-Link
    Electronic eBook
  13. 53
    Published 2004
    Table of Contents: “…-2 -- The Related-Key Rectangle Attack – Application to SHACAL-1 -- Related Key Differential…”
    Full Text via HEAL-Link
    Electronic eBook
  14. 54
    Published 2014
    Table of Contents: “… -- Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm…”
    Full Text via HEAL-Link
    Electronic eBook
  15. 55
    Published 2000
    Table of Contents: “… against Differential Cryptanalysis and Linear Cryptanalysis -- On the Pseudorandomness of Top-Level…”
    Full Text via HEAL-Link
    Electronic eBook
  16. 56
    Published 2008
    Table of Contents: “… Differential Cryptanalysis Application to CS-Cipher -- VNSOptClust: A Variable Neighborhood Search Based…”
    Full Text via HEAL-Link
    Electronic eBook
  17. 57
    Published 2019
    Table of Contents: “… Recommender System -- Differential Cryptanalysis of Symmetric Block Ciphers Using Memetic Algorithms…”
    Full Text via HEAL-Link
    Electronic eBook
  18. 58
    Published 2010
    Table of Contents: “… -- Differential Cryptanalysis of Blow-CAST-Fish -- A Keyless Polyalphabetic Cipher -- Vertical Handover between…”
    Full Text via HEAL-Link
    Electronic eBook
Search Tools: RSS Feed Email Search