„cryptanalysis“
Suchergebnisse
731 Treffer
-
Applied Cryptography and Network Security – 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings
-
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication – 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings
-
Computational Intelligence in Security for Information Systems – 4th International Conference, CISIS 2011, Held at IWANN 2011, Torremolinos-Málaga, Spain, June 8-10, 2011. Proceedings
-
Selected Areas in Cryptography – 17th International Workshop, SAC 2010, Waterloo, Ontario, Canada, August 12-13, 2010, Revised Selected Papers
-
Cryptology and Network Security – 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings
-
Progress in Pattern Recognition, Image Analysis, Computer Vision, and Applications – 15th Iberoamerican Congress on Pattern Recognition, CIARP 2010, Sao Paulo, Brazil, November 8-11, 2010. Proceedings
-
Advances in Information and Computer Security – 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings
-
Information Security Applications – 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers
-
Cryptology and network security – 8th international conference ; proceedings
-
Information security theory and practices – smart cards, mobile and ubiquitous computing systems ; first IFIP TC6, WG 8.8, WG 11.2 international workshop ; proceedings
-
Some hints for the design of digital chaos-based cryptosystems – lessons learned from cryptanalysis
-
Group Factorizations and Cryptology
-
A Methodology for the Cryptanalysis of Classical Ciphers with Search Metaheuristics
-
Secure Volunteer Computing for Distributed Cryptanalysis
-
Towards efficient practical side-channel cryptanalysis
-
High performance algorithms for lattice-based cryptanalysis
-
Cryptanalysis and Design of Symmetric Primitives
-
Cryptanalysis using reconfigurable hardware clusters for high-performance computing
-
DECT Security Analysis
-
Computing Shortest Lattice Vectors on Special Hardware