-
41Published 2008Table of Contents: “… Adversary -- Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers -- Multidimensional…”
Full Text via HEAL-Link
Electronic eBook -
42Published 2008Table of Contents: “… -- Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent -- Impossible Differential…”
Full Text via HEAL-Link
Electronic eBook -
43Published 2019Table of Contents: “… -- Impossible Differential Cryptanalysis of SPECK -- Detect Peer-To-Peer Botnet with Permutation Entropy…”
Full Text via HEAL-Link
Electronic eBook -
44Published 2008Table of Contents: “… Exchange -- Cryptanalysis -- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced…”
Full Text via HEAL-Link
Electronic eBook -
45Published 1999Table of Contents: “… Keys of HPC -- Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials -- Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
46Published 1998Table of Contents: “… -- Differential collisions in SHA-0 -- From differential cryptanalysis to ciphertext-only attacks -- A simplified…”
Full Text via HEAL-Link
Electronic eBook -
47Published 2002Table of Contents: “… -- Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential…”
Full Text via HEAL-Link
Electronic eBook -
48Published 2003Table of Contents: “… of Differential Cryptanalysis in Abelian Groups -- Authorization -- Trust and Authorization in Pervasive B2E…”
Full Text via HEAL-Link
Electronic eBook -
49Published 1998Table of Contents: “… -- Differential cryptanalysis of a block cipher -- On private-key cryptosystems based on product codes -- Key…”
Full Text via HEAL-Link
Electronic eBook -
50Published 2001Table of Contents: “… Differential Cryptanalysis -- Known-IV Attacks on Triple Modes of Operation of Block Ciphers -- Generic Attacks…”
Full Text via HEAL-Link
Electronic eBook -
51Published 2010Table of Contents: “… -- Impossible Differential Cryptanalysis on Feistel Ciphers with SP and SPS Round Functions -- Multi-trail…”
Full Text via HEAL-Link
Electronic eBook -
52Published 2005Table of Contents: “… Computation with Optimal Resilience -- Algebra and Number Theory II -- Differential Cryptanalysis…”
Full Text via HEAL-Link
Electronic eBook -
53Published 2004Table of Contents: “…-2 -- The Related-Key Rectangle Attack – Application to SHACAL-1 -- Related Key Differential…”
Full Text via HEAL-Link
Electronic eBook -
54Published 2014Table of Contents: “… -- Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm…”
Full Text via HEAL-Link
Electronic eBook -
55Published 2000Table of Contents: “… against Differential Cryptanalysis and Linear Cryptanalysis -- On the Pseudorandomness of Top-Level…”
Full Text via HEAL-Link
Electronic eBook -
56Published 2008Table of Contents: “… Differential Cryptanalysis Application to CS-Cipher -- VNSOptClust: A Variable Neighborhood Search Based…”
Full Text via HEAL-Link
Electronic eBook -
57Published 2019Table of Contents: “… Recommender System -- Differential Cryptanalysis of Symmetric Block Ciphers Using Memetic Algorithms…”
Full Text via HEAL-Link
Electronic eBook -
58Published 2010Table of Contents: “… -- Differential Cryptanalysis of Blow-CAST-Fish -- A Keyless Polyalphabetic Cipher -- Vertical Handover between…”
Full Text via HEAL-Link
Electronic eBook