-
1
-
2
-
3
-
4
-
5“...Cryptanalysis of an asymmetric cipher on Boolean functions...”
Get full text
Перейти в каталог НБ ТГУ
Article -
6“...General algebraic cryptographic key exchange scheme and its cryptanalysis...”
Get full text
Перейти в каталог НБ ТГУ
Article -
7“...About 2-cascade finite automata cryptographic generators and their cryptanalysis...”
Get full text
Перейти в каталог НБ ТГУ
Article -
8“...Cryptanalysis of 2-cascade finite automata generator with functional key...”
Get full text
Перейти в каталог НБ ТГУ
Article -
9Published in Springer eBooks (2015)Table of Contents: “...Block cipher cryptanalysis -- Understanding attacks -- Implementation issues -- More block cipher...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
10Published in Springer eBooks (2013)Table of Contents: “...Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
11Published in Springer eBooks (2015)Table of Contents: “...Cryptanalysis of the Multilinear Map over the Integers -- Robust Authenticated-Encryption AEZ...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
12Published in Springer eBooks (2013)Table of Contents: “...-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
13Published in Springer eBooks (2015)Table of Contents: “... and IO -- Pseudorandomness -- Block cipher cryptanalysis -- Integrity -- Assumptions -- Hash functions...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
14Published in Springer eBooks (2015)Table of Contents: “... and IO -- Pseudorandomness -- Block cipher cryptanalysis -- Integrity -- Assumptions -- Hash functions...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
15Published in Springer eBooks (2013)Table of Contents: “...-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
16Published in Springer eBooks (2014)Table of Contents: “...Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
17Published in Springer eBooks (2014)Table of Contents: “...Cryptology and coding theory -- Authenticated encryption -- Symmetric key cryptanalysis -- Side...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
18Published in Springer eBooks (2013)Table of Contents: “... -- On Minimal and Quasi-minimal Linear Codes -- A Code-Based Undeniable Signature Scheme -- Cryptanalysis...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
19Published in Springer eBooks (2015)Table of Contents: “... -- Symmetric Key Cryptanalysis -- Improved Top-Down Techniques in Differential Cryptanalysis -- Algebraic...”
Get full text
Перейти в каталог НБ ТГУ
eBook -
20Published in Springer eBooks (2013)Table of Contents: “... Cipher -- Block Cipher Cryptanalysis -- Related-Key Slide Attacks on Block Ciphers with Secret Components...”
Get full text
Перейти в каталог НБ ТГУ
eBook