by
Won, Dong Ho. editor.
Format:
Electronic Resources
Excerpt:
Estimate the Damage Propagation of Cyber Attacks -- Foundations of Attack Trees -- Block/Stream Ciphers (I
by
Pointcheval, David. editor.
Format:
Electronic Resources
Excerpt:
Message Authentication Protocol -- Block Ciphers -- A New Criterion for Nonlinearity of Block Ciphers
View Other Search Results
by
Roy, Bimal. editor.
Format:
Electronic Resources
Excerpt:
Ciphers -- A Practical Attack on the Fixed RC4 in the WEP Mode -- A Near-Practical Attack Against B Mode
by
Prisco, Roberto. editor.
Format:
Electronic Resources
Excerpt:
distributed systems security, signatures schemes, block ciphers, anonymity, e-commerce, public key encryption
by
Preneel, Bart. editor.
Format:
Electronic Resources
Excerpt:
Decryption Mechanism -- Stream Ciphers II -- On the (Im)Possibility of Practical and Secure Nonlinear Filters
by
Garay, Juan A. editor.
Format:
Electronic Resources
Excerpt:
Keystream Generation Algorithms of the Stream Ciphers TPy and Py -- Network Security -- Queue Management as
by
Breveglieri, Luca. editor.
Format:
Electronic Resources
Excerpt:
and Reconfigurable Pipeline for Symmetric Block Ciphers -- Models for Fault Attacks on Cryptographic
by
Handschuh, Helena. editor.
Format:
Electronic Resources
Excerpt:
Secret Block Ciphers -- Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
by
Katsikas, Sokratis K. editor.
Format:
Electronic Resources
Excerpt:
Hard-to-Reverse Negative Databases -- Block Ciphers and Hash Functions -- Related-Key Rectangle Attack on 42-Round
by
Vaudenay, Serge. editor.
Format:
Electronic Resources
Excerpt:
Networks -- Block Ciphers -- A Provable-Security Treatment of the Key-Wrap Problem -- Luby-Rackoff Ciphers
by
Batten, Lynn Margaret. editor.
Format:
Electronic Resources
Excerpt:
Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks -- Symmetric Key Ciphers
by
Zhou, Jianying. editor.
Format:
Electronic Resources
Excerpt:
-- Cryptanalysis -- The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions -- Breaking a New
Limit Search Results
Narrowed by: