-
61Published in Springer eBooks (2014)Table of Contents: “...4 -- The LOCAL attack: Cryptanalysis of the authenticated encryption scheme ALE -- AEGIS: A Fast...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
62
-
63
-
64
-
65
-
66Table of Contents: “...?- Major Technical Encryption Systems -- JN-25 and its Cryptanalysis -- Using Common Book Groups...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
67
-
68
-
69
-
70
-
71
-
72
-
73Published in Springer eBooks (2014)Table of Contents: “... Distinguishers: Side-Channel Analysis vs. Differential Cryptanalysis -- Pragmatism vs. Elegance: comparing two...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
74Published in Springer eBooks (2014)Table of Contents: “... for Wireless Body Area Networks -- Cryptanalysis of SIMON Variants with Connections -- Privacy-Preserving...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
75
-
76Published in Springer eBooks (2014)Table of Contents: “... -- Improving Impossible Differential Cryptanalysis with Concrete Investigation of Key Scheduling Algorithm...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
77
-
78Published in Springer eBooks (2013)Table of Contents: “... -- Cryptanalysis of Helix and Phelix Revisited -- Toward Separating the Strong Adaptive Pseudo-Freeness from...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
79
-
80Published in Springer eBooks (2014)Table of Contents: “... Protocol from Eurocrypt 2011 -- Improved Linear Cryptanalysis of Reduced-Round MIBS -- Characterization...”
Get full text
Перейти в каталог НБ ТГУ
eBook