„cryptanalysis“
Suchergebnisse
731 Treffer
-
Advances in Cryptology – CRYPTO 2014 – 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part II
-
Advances in Cryptology – CRYPTO 2014 – 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part I
-
Cryptanalysis and enhancement of a quantum-secure two-party authentication protocol for mobile devices
-
The New Codebreakers – Essays Dedicated to David Kahn on the Occasion of His 85th Birthday
-
The new codebreakers – essays dedicated to David Kahn on the occasion of His 85th birthday
-
Advances in Cryptology – ASIACRYPT 2018 – 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2–6, 2018, Proceedings, Part III
-
Progress in Cryptology – AFRICACRYPT 2014 – 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings
-
Computation, Cryptography, and Network Security
-
Computational Collective Intelligence – 7th International Conference, ICCCI 2015 Madrid, Spain, September 21–23, 2015. Proceedings, Part I
-
Open Problems in Mathematics and Computational Science
-
The Design of Rijndael – AES — The Advanced Encryption Standard
-
Progress in Cryptology -- INDOCRYPT 2015 – 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings
-
Information Security and Cryptology – 11th International Conference, Inscrypt 2015, Beijing, China, November 1-3, 2015, Revised Selected Papers
-
Advances in Cryptology – EUROCRYPT 2016 – 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I
-
Mobile Internet Security – First International Symposium, MobiSec 2016, Taichung, Taiwan, July 14-15, 2016, Revised Selected Papers
-
Modern Cryptanalysis – Techniques for Advanced Code Breaking
-
Cryptanalysis of two post-quantum authenticated key agreement protocols
-
Why cryptography should not rely on physical attack complexity
-
On the insecurity of XML Security
-
Improved Markov Chain Monte Carlo method for cryptanalysis substitution-transposition cipher