Search Result Save to File Save as CSV
Your search for 38531 returns 2598 document(s)
New attacks against standardized macs, (LNCS-Lecture Notes in Computer Science 2887) Hal 170-181
Author: Antoine Joux; Guillaume Poupard; Jacques Stern; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A generic protection against high-order differential power analysis, (LNCS-Lecture Notes in Computer Science 2887) Hal 192-205
Author: Mehdi-Laurent Akkar; Louis Goubin; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Rabbit: a new high-performance stream cipher, (LNCS-Lecture Notes in Computer Science 2887) Hal 307-329
Author: Martin Boesgaard; Mette Vesterager; Thomas Pedersen; Jesper Christiansen; Ove Scavenius; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Parsha-256 - a new parallelizable hash function and a multihreaded implementation, (LNCS-Lecture Notes in Computer Science 2887) Hal 347-361
Author: Pinakpani Pal; Palash Sarkar; | Call Number: 652.8 Joh f | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Optimized X2-attack against RC6, (LNCS-Lecture Notes in Computer Science 2576) Hal 16-32
Author: Norihisa Isogai; Takashi Matsunaka; Atsuko Miyaji; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Timing attack against implementation of a parallel algorithm for modular exponentiation, (LNCS-Lecture Notes in Computer Science 2576) Hal 319-330
Author: Yasuyuki Sakai; Kouichi Sakurai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Low cost attacks on tamper resistant devices, (LNCS-Lecture Notes in Computer Science 1361) Hal 125-136
Author: Ross Anderson; Markus Kuhn; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On the security propeties and attacks againts mobile agent graph head scaling (MGHS), (LNCS-Lecture Notes in Computer Science 5576) Hal. 223-228
Author: Abid Khan; Qasim Arshad; Xiamu Niu; Zhang Yong; Muhammad Waqas Anwar; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Open key exchange: how to defeat dictionary attacks without encrypting public keys, (LNCS-Lecture Notes in Computer Science 939) Hal 79-90
Author: Stefan Lucks; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A New strongly secure authenticated key exchange protocol, (LNCS-Lecture Notes in Computer Science 5576) Hal. 135-144
Author: Qingfeng Cheng; Chuangui Ma, and Xuexian Hu; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next