Search Results - "cryptanalysis"

  1. 681
  2. 682
  3. 683
  4. 684

    Applied cryptography and network security third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings /

    Published 2005
    Table of Contents: “…Kim, Vishal Kher -- Cryptanalysis of an improved client-to-client password-…”
    Full Text (via Springer)
    Electronic Conference Proceeding eBook
  5. 685
  6. 686
  7. 687

    Coding theory and applications : 4th International Castle Meeting, Palmela Castle, Portugal, September 15-18, 2014 /

    Published 2015
    Table of Contents: “…S. Mesnager -- 13 Cryptanalysis of Public-Key Cryptosystems that use Subcodes …”
    Full Text (via Springer)
    Conference Proceeding eBook
  8. 688

    Artificial intelligence and security : 5th International Conference, ICAIS 2019, New York, NY, USA, July 26-28, 2019, proceedings.

    Published 2019
    Table of Contents: “…Techniques -- A Distributed Cryptanalysis Framework based on Mobile Phones -- A Novel …”
    Full Text (via Springer)
    Conference Proceeding eBook
  9. 689

    Proceedings of fourth International Conference on Soft Computing for Problem Solving : SocProS 2014.

    Published 2015
    Table of Contents: “…Real Life Problems -- Cryptanalysis of Transposition Cipher Using Hill Climbing …”
    Full Text (via Springer)
    Conference Proceeding eBook
  10. 690

    Network Security and Cryptography. by Musa, Sarhan M.

    Published 2022
    Table of Contents: “…6.6.3 Differential Cryptanalysis vs. Linear Cryptanalysis -- 6.7 Multiple …”
    Full Text (via ProQuest)
    Electronic eBook
  11. 691

    LTE Security. by Horn, G?nther, Moeller, Wolf-Dietrich, Niemi, Valtteri

    Published 2010
    Table of Contents: “…Cryptography and PKI -- 2.3.6 Cryptanalysis -- 2.4 Introduction to LTE Standardization …”
    Full Text (via O'Reilly/Safari)
    eBook
  12. 692

    IoT based control networks and intelligent systems proceedings of 3rd ICICNIS /

    Published 2022
    Table of Contents: “…Survey, Performance, Cryptanalysis and Research Challenges -- IMAGE CLASSIFICATION …”
    Full Text (via Springer)
    Electronic Conference Proceeding eBook
  13. 693

    New trends in computer technologies and applications : 25th International Computer Symposium, ICS 2022, Taoyuan, Taiwan, December 15-17, 2022, proceedings /

    Published 2023
    Table of Contents: “…Physical Layer Coding and Cryptanalysis for The Security Communications -- Mobile …”
    Full Text (via Springer)
    Conference Proceeding eBook
  14. 694

    Multivariate public key cryptosystems / by Ding, Jintai, Petzoldt, Albrecht, Schmidt, Dieter S.

    Published 2020
    Table of Contents: “…Efficiency -- 4.3.5 Cryptanalysis of ZHFE -- 4.4 Signature Schemes Based …”
    Full Text (via Springer)
    eBook
  15. 695

    Advanced secure optical image processing for communications /

    Published 2018
    Table of Contents: “…decomposition -- 5.4. Cryptanalysis -- 5.5. Modifications in EMD-based optical …”
    Online Access
    eBook
  16. 696

    Information and decision sciences : proceedings of the 6th International Conference on FICTA /

    Published 2018
    Table of Contents: “…consensus with ties -- 38. Cryptanalysis of Image Cryptosystem Using Synchronized …”
    Full Text (via Springer)
    Conference Proceeding eBook
  17. 697

    Elements of algebraic coding systems / by Rocha, Valdemar C. da, 1947-

    Published 2014
    Table of Contents: “…Decryption -- 10.2.4 Cryptanalysis -- 10.2.5 Trapdoors -- 10.3 Secret-key …”
    Full Text (via ProQuest)
    eBook
  18. 698
  19. 699

    Artificial neural networks - ICANN 2010 20th international conference, Thessaloniki, Greece, September 15-18, 2010, proceedings.

    Published 2010
    Table of Contents: “…Policy Gradients for Cryptanalysis -- Linear Projection Method Based on Information …”
    Full Text (via Springer)
    Electronic Conference Proceeding eBook
  20. 700

    Proceedings of the Third International Conference on Soft Computing for Problem Solving : SocProS 2013.

    Published 2014
    Table of Contents: “…and Right Heights -- Cryptanalysis of "A New Method of Cryptography using …”
    Full Text (via Springer)
    Conference Proceeding eBook
Search Tools: RSS Feed Save Search