by
Won, Dong Ho. editor.
Format:
Electronic Resources
Excerpt:
Estimate the Damage Propagation of Cyber Attacks -- Foundations of Attack Trees -- Block/Stream Ciphers (I
by
Pointcheval, David. editor.
Format:
Electronic Resources
Excerpt:
Message Authentication Protocol -- Block Ciphers -- A New Criterion for Nonlinearity of Block Ciphers
View Other Search Results
by
Roy, Bimal. editor.
Format:
Electronic Resources
Excerpt:
Ciphers -- A Practical Attack on the Fixed RC4 in the WEP Mode -- A Near-Practical Attack Against B Mode
by
Preneel, Bart. editor.
Format:
Electronic Resources
Excerpt:
Decryption Mechanism -- Stream Ciphers II -- On the (Im)Possibility of Practical and Secure Nonlinear Filters
by
Prisco, Roberto. editor.
Format:
Electronic Resources
Excerpt:
distributed systems security, signatures schemes, block ciphers, anonymity, e-commerce, public key encryption
by
Garay, Juan A. editor.
Format:
Electronic Resources
Excerpt:
Keystream Generation Algorithms of the Stream Ciphers TPy and Py -- Network Security -- Queue Management as
by
Breveglieri, Luca. editor.
Format:
Electronic Resources
Excerpt:
and Reconfigurable Pipeline for Symmetric Block Ciphers -- Models for Fault Attacks on Cryptographic
by
Handschuh, Helena. editor.
Format:
Electronic Resources
Excerpt:
Secret Block Ciphers -- Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
by
Goubin, Louis. editor.
Format:
Electronic Resources
Excerpt:
Cryptosystem -- Special Purpose Hardware -- Breaking Ciphers with COPACOBANA –A Cost-Optimized Parallel Code
by
Zhou, Jianying. editor.
Format:
Electronic Resources
Excerpt:
-- Cryptanalysis -- The Rainbow Attack on Stream Ciphers Based on Maiorana-McFarland Functions -- Breaking a New
by
Batten, Lynn Margaret. editor.
Format:
Electronic Resources
Excerpt:
Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks -- Symmetric Key Ciphers
by
Vaudenay, Serge. editor.
Format:
Electronic Resources
Excerpt:
Networks -- Block Ciphers -- A Provable-Security Treatment of the Key-Wrap Problem -- Luby-Rackoff Ciphers
Limit Search Results
Narrowed by: