Search Result Save to File Save as CSV
Your search for 38529 returns 2330 document(s)
Differential-linear cryptanalysis of serpent, (LNCS-Lecture Notes in Computer Science 2887) Hal 9-21
Author: Eli Biham; Orr Dunkelman; Nathan Keller; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Rectangle attack on 49-round shacal-1, (LNCS-Lecture Notes in Computer Science 2887) Hal 22-35
Author: Eli Biham; Orr Dunkelman; Nathan Keller; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptanalysis of block ciphers based on sha-1 and md5, (LNCS-Lecture Notes in Computer Science 2887) Hal 36-44
Author: Markku-Juhani O. Saarinen; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Analysis of involutional ciphers: khazad and anubis, (LNCS-Lecture Notes in Computer Science 2887) Hal 45-53
Author: Alex Biryukov; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Concrete security analysis for 3gpp-mac, (LNCS-Lecture Notes in Computer Science 2887) Hal 154-169
Author: Dowon Hong; Ju-Sung Kang; Bart Preneel; Heuisu Ryu; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
New attacks against standardized macs, (LNCS-Lecture Notes in Computer Science 2887) Hal 170-181
Author: Antoine Joux; Guillaume Poupard; Jacques Stern; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A generic protection against high-order differential power analysis, (LNCS-Lecture Notes in Computer Science 2887) Hal 192-205
Author: Mehdi-Laurent Akkar; Louis Goubin; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Further observations on the structure of the aes algorithm, (LNCS-Lecture Notes in Computer Science 2887) Hal 223-234
Author: Beomsik Song; Jennifer Seberry; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Optimal key ranking procedures in a statistical cryptanalysis, (LNCS-Lecture Notes in Computer Science 2887) Hal 235-246
Author: Pascal Junod; Serge Vaudenay; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Linear approximations of addition modulo 2n, (LNCS-Lecture Notes in Computer Science 2887) Hal 261-273
Author: Johan Wallen; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next