Search Results - "cryptanalysis"
Suggested Topics within your search.
Suggested Topics within your search.
- Data encryption (Computer science) 338
- Computer security 335
- Cryptography 208
- Security measures 166
- Computer networks 147
- Access control 70
- Computers 64
- Computer science 57
- Data protection 40
- Coding theory 36
- Mathematics 35
- Public key cryptography 20
- Data processing 18
- Soft computing 18
- Ciphers 17
- Telecommunication 17
- Telecommunication systems 16
- Computer algorithms 14
- Artificial intelligence 12
- Computer software 12
- Data structures (Computer science) 12
- Number theory 12
- Algorithms 11
- Information technology 11
- Operating systems (Computers) 11
- World War, 1939-1945 11
- Combinatorial analysis 10
- Computational intelligence 10
- History 10
- Internet 10
-
501
Cryptography and secure communication /
Published 2014Table of Contents: “…cascade ciphers -- 1.7. Cryptanalysis -- 1.8. Implementation attacks -- 1.9.Complexity …”
Book -
502
Advances in technology and management proceedings of the 2012 International Conference on Technology and Management (ICTAM 2012), International Convention Center Jeju, Jeju-Island,...
Published 2012Table of Contents: “…Cryptanalysis on Public Key Encryption Scheme Using Ergodic …”
Full Text (via Springer)
Electronic Conference Proceeding eBook -
503
Network and system security : 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014, Proceedings /
Published 2014Table of Contents: “…Application to LBlock -- Cryptanalysis on the Authenticated Cipher Sablier -- …”
Full Text (via Springer)
Conference Proceeding eBook -
504
Timing channels in cryptography : a micro-architectural perspective /
Published 2014Table of Contents: “…CAMELLIA; 2.3 Classical Cryptanalysis; 2.3.1 Classical Cryptanalysis of Block …”
Full Text (via Springer)
eBook -
505
Information security, practice and experience 6th international conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010 : proceedings /
Published 2010Table of Contents: “…Cryptanalysis. Improved related-key boomerang attacks …”
Full Text (via Springer)
Electronic Conference Proceeding eBook -
506
Proceedings of International Conference on Network Security and Blockchain Technology : ICNSBT 2023 /
Published 2024Table of Contents: “…Authentication Phase -- 3 Cryptanalysis of the Khan et al.'s Scheme…”
Full Text (via Springer)
Conference Proceeding eBook -
507
Advances in cryptology -- CRYPTO 2021 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual event, August 16-20, 2021, Proceedings.
Published 2021Full Text (via Springer)
Electronic Conference Proceeding eBook -
508
Applied cryptography and network security 4th international conference, ACNS 2006, Singapore, June 6-9, 2006 : proceedings /
Published 2006Table of Contents: “…Stateful Subset Cover -- Cryptanalysis -- The Rainbow Attack on Stream Ciphers …”
Full Text (via Springer)
Electronic Conference Proceeding eBook -
509
Post-quantum cryptography second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings /
Published 2008Table of Contents: “…Hash Functions -- Cryptanalysis of Rational Multivariate Public Key Cryptosystems …”
Full Text (via Springer)
Electronic Conference Proceeding eBook -
510
Recent advances in nonlinear dynamics and synchronization theory and applications /
Published 2009Table of Contents: “…Systems and Its Uses in Cryptanalysis -- Trust-Based Collaborative Control for …”
Full Text (via Springer)
Electronic eBook -
511
Proceedings of International Ethical Hacking Conference 2018 : eHaCON 2018, Kolkata, India /
Published 2019Table of Contents: “…Environment -- Chapter 6.Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-…”
Full Text (via Springer)
Conference Proceeding eBook -
512
Cryptography and secure communication /
Published 2014Table of Contents: “…cascade ciphers -- 1.7. Cryptanalysis -- 1.8. Implementation attacks -- 1.9.Complexity …”
Full Text (via Skillsoft)
Electronic eBook -
513
Cryptography and secure communication /
Published 2014Table of Contents: “…cascade ciphers -- 1.7. Cryptanalysis -- 1.8. Implementation attacks -- 1.9.Complexity …”
Full Text (via Cambridge)
Electronic eBook -
514
-
515
Mathematical foundations of public key cryptography /
Published 2016Full Text (via Taylor & Francis)
eBook -
516
-
517
Quantum computing accelerator I/O LDRD 52750 final report.
Published 2003Online Access (via OSTI)
Government Document Electronic eBook -
518
-
519
Security aspects in information technology first international conference, InfoSecHiComNet 2011, Haldia, India, October 19-22, 2011 : proceedings /
Published 2011Full Text (via Springer)
Electronic Conference Proceeding eBook -
520
Advances in cryptology--CRYPTO '90 proceedings /
Published 1991Full Text (via Springer)
Electronic Conference Proceeding eBook