Search Results - "cryptanalysis"

  1. 501

    Cryptography and secure communication / by Blahut, Richard E.

    Published 2014
    Table of Contents: “…cascade ciphers -- 1.7. Cryptanalysis -- 1.8. Implementation attacks -- 1.9.Complexity …”
    Book
  2. 502

    Advances in technology and management proceedings of the 2012 International Conference on Technology and Management (ICTAM 2012), International Convention Center Jeju, Jeju-Island,...

    Published 2012
    Table of Contents: “…Cryptanalysis on Public Key Encryption Scheme Using Ergodic …”
    Full Text (via Springer)
    Electronic Conference Proceeding eBook
  3. 503

    Network and system security : 8th International Conference, NSS 2014, Xi'an, China, October 15-17, 2014, Proceedings /

    Published 2014
    Table of Contents: “…Application to LBlock -- Cryptanalysis on the Authenticated Cipher Sablier -- …”
    Full Text (via Springer)
    Conference Proceeding eBook
  4. 504

    Timing channels in cryptography : a micro-architectural perspective / by Rebeiro, Chester, Mukhopadhyay, Debdeep, Bhattacharya, Sarani

    Published 2014
    Table of Contents: “…CAMELLIA; 2.3 Classical Cryptanalysis; 2.3.1 Classical Cryptanalysis of Block …”
    Full Text (via Springer)
    eBook
  5. 505

    Information security, practice and experience 6th international conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010 : proceedings /

    Published 2010
    Table of Contents: “…Cryptanalysis. Improved related-key boomerang attacks …”
    Full Text (via Springer)
    Electronic Conference Proceeding eBook
  6. 506

    Proceedings of International Conference on Network Security and Blockchain Technology : ICNSBT 2023 /

    Published 2024
    Table of Contents: “…Authentication Phase -- 3 Cryptanalysis of the Khan et al.'s Scheme…”
    Full Text (via Springer)
    Conference Proceeding eBook
  7. 507
  8. 508

    Applied cryptography and network security 4th international conference, ACNS 2006, Singapore, June 6-9, 2006 : proceedings /

    Published 2006
    Table of Contents: “…Stateful Subset Cover -- Cryptanalysis -- The Rainbow Attack on Stream Ciphers …”
    Full Text (via Springer)
    Electronic Conference Proceeding eBook
  9. 509

    Post-quantum cryptography second international workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008 : proceedings /

    Published 2008
    Table of Contents: “…Hash Functions -- Cryptanalysis of Rational Multivariate Public Key Cryptosystems …”
    Full Text (via Springer)
    Electronic Conference Proceeding eBook
  10. 510

    Recent advances in nonlinear dynamics and synchronization theory and applications /

    Published 2009
    Table of Contents: “…Systems and Its Uses in Cryptanalysis -- Trust-Based Collaborative Control for …”
    Full Text (via Springer)
    Electronic eBook
  11. 511

    Proceedings of International Ethical Hacking Conference 2018 : eHaCON 2018, Kolkata, India /

    Published 2019
    Table of Contents: “…Environment -- Chapter 6.Cryptanalysis and Improvement of Three-Factor-Based Confidentiality-…”
    Full Text (via Springer)
    Conference Proceeding eBook
  12. 512

    Cryptography and secure communication / by Blahut, Richard E.

    Published 2014
    Table of Contents: “…cascade ciphers -- 1.7. Cryptanalysis -- 1.8. Implementation attacks -- 1.9.Complexity …”
    Full Text (via Skillsoft)
    Electronic eBook
  13. 513

    Cryptography and secure communication / by Blahut, Richard E.

    Published 2014
    Table of Contents: “…cascade ciphers -- 1.7. Cryptanalysis -- 1.8. Implementation attacks -- 1.9.Complexity …”
    Full Text (via Cambridge)
    Electronic eBook
  14. 514
  15. 515
  16. 516
  17. 517

    Quantum computing accelerator I/O LDRD 52750 final report.

    Published 2003
    Online Access (via OSTI)
    Government Document Electronic eBook
  18. 518
  19. 519
  20. 520

    Advances in cryptology--CRYPTO '90 proceedings /

    Published 1991
    Full Text (via Springer)
    Electronic Conference Proceeding eBook
Search Tools: RSS Feed Save Search