„attack complexity“
Suchergebnisse
1.000+ Treffer
-
Why cryptography should not rely on physical attack complexity
-
Attacking complexity in logic synthesis of asynchronous circuits
-
Theory of Cryptography – 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings
-
Algorithms for Sensor Systems – 6th International Workshop on Algorithms for Sensor Systems, Wireless Ad Hoc Networks, and Autonomous Mobile Entities, ALGOSENSORS 2010, Bordeaux, France, July 5, 2010, Revised Selected Papers
-
Theory of Cryptography – Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005. Proceedings
-
Provable Security – 11th International Conference, ProvSec 2017, Xi'an, China, October 23-25, 2017, Proceedings
-
The New Codebreakers – Essays Dedicated to David Kahn on the Occasion of His 85th Birthday
-
The new codebreakers – essays dedicated to David Kahn on the occasion of His 85th birthday
-
Progress in Cryptology -- INDOCRYPT 2015 – 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings
-
Advances in Cryptology – EUROCRYPT 2016 – 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I
-
Graphical Models for Security – Second International Workshop, GraMSec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers
-
Why Cryptography Should Not Rely on Physical Attack Complexity
-
Why cryptography should not rely on physical attack complexity
-
Theory of cryptography – proceedings
-
Reconfigurable Cryptographic Processor
-
Cloud-based email phishing attack using machine and deep learning algorithm
-
An XGBoost-based casualty prediction method for terrorist attacks
-
From product recommendation to cyber-attack prediction: generating attack graphs and predicting future attacks
-
Progress in cryptology – proceedings
-
A Low-Complexity Key-Recovery Attack on 6-Round Midori64