Search Results - "Attack the Block"
Suggested Topics within your search.
Suggested Topics within your search.
- Computer security 15
- Data encryption (Computer science) 15
- Mathematics 5
- Ciphers 4
- Computer algorithms 4
- Cryptography 4
- Security measures 4
- Access control 3
- Computer networks 3
- Computers 2
- History 2
- Motion pictures 2
- Passwords 2
- Social aspects 2
- Beginning Reading 1
- Black people 1
- Black people in motion pictures 1
- Cities and towns in motion pictures 1
- Coding theory 1
- Data protection 1
- Data structures (Computer science) 1
- Identity (Psychology) in motion pictures 1
- In motion pictures 1
- Internet 1
- Leadership 1
- Learning Problems 1
- Men, Black, in motion pictures 1
- National characteristics, British, in motion pictures 1
- Number theory 1
- Organizational behavior 1
-
21
Security of block ciphers : from algorithm design to hardware implementation /
Published 2015Table of Contents: “…Meet-in-the-Middle Attack on Block Ciphers 260 6.4.2 Meet-in-the-Middle Attack …”
Full Text (via IEEE)
eBook -
22
Applied cryptography and network security workshops : ACNS 2022 satellite workshops, AIBlock, AIHWS, AIoTS, CIMSS, Cloud S&P, SCI, SecMT, SiMLA, Rome, Italy, June 20-23, 2022, proc...
Published 2022Table of Contents: “…Output Prediction Attacks on Block Ciphers using Deep Learning -- HolA: Holistic …”
Full Text (via Springer)
Conference Proceeding eBook -
23
Fast software encryption 12th international workshop, FSE 2005, Paris, France, February 21-23, 2005 : revised selected papers /
Published 2005Table of Contents: “…-- New combined attacks on block ciphers / Eli Biham, Orr Dunkelman and …”
Full Text (via Springer)
Electronic Conference Proceeding eBook -
24
Cryptography and security from theory to applications ; essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday /
Published 2012Table of Contents: “…Self-similarity attacks on block ciphers and application to KeeLoq / Nicolas …”
Full Text (via Springer)
Electronic eBook -
25
Fundamentals of IP and SoC security : design, verification, and debug /
Published 2017Table of Contents: “…Principle of Scan-Chain-Attacks on Block Ciphers; 5.6 Conclusions; References; …”
Full Text (via Springer)
eBook -
26
Symmetric Cryptography. Cryptanalysis and Future Directions /
Published 2023Table of Contents: “…1.1. Statistical attacks on block ciphers: preliminaries -- 1.2. Principle …”
Full Text (via Wiley)
Electronic eBook -
27
-
28
-
29
Stemming, Jointing, and Eradicating Legitimate Learning Quagmires
Published 2001Request ERIC Document
Microfilm Book -
30
Progress in cryptology--INDOCRYPT 2010 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010 : proceedings /
Published 2010Full Text (via Springer)
Electronic Conference Proceeding eBook -
31
Move : Getting Your Organization to Implement the Strategy You Keep Talking About.
Published 2017Full Text (via Skillsoft)
Electronic eBook -
32