The following pages link to The New Codebreakers (Q2803611):
Displayed 33 items.
- Mary of Guise’s Enciphered Letters (Q2803612) (← links)
- About Professionalisation in the Intelligence Community: The French Cryptologists (ca 1870–ca 1945) (Q2803613) (← links)
- Myths and Legends of the History of Cryptology (Q2803615) (← links)
- Vernam, Mauborgne, and Friedman: The One-Time Pad and the Index of Coincidence (Q2803617) (← links)
- The Fall of a Tiny Star (Q2803618) (← links)
- Post-Quantum Cryptography: State of the Art (Q2803619) (← links)
- What is the Future of Cryptography? (Q2803620) (← links)
- Bitsliced High-Performance AES-ECB on GPUs (Q2803622) (← links)
- Buying AES Design Resistance with Speed and Energy (Q2803624) (← links)
- Double-Speed Barrett Moduli (Q2803625) (← links)
- Failure is Also an Option (Q2803626) (← links)
- How to (Carefully) Breach a Service Contract? (Q2803627) (← links)
- SpoofKiller: You Can Teach People How to Pay, but Not How to Pay Attention (Q2803629) (← links)
- Cyber-Physical Systems Security (Q2803631) (← links)
- Practical Techniques Building on Encryption for Protecting and Managing Data in the Cloud (Q2803632) (← links)
- Cryptography as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack (Q2803633) (← links)
- Dual EC: A Standardized Back Door (Q2803634) (← links)
- An Improved Differential Attack on Full GOST (Q2803635) (← links)
- Cryptographic Hash Functions and Expander Graphs: The End of the Story? (Q2803636) (← links)
- Polynomial Evaluation and Side Channel Analysis (Q2803637) (← links)
- Photonic Power Firewalls (Q2803641) (← links)
- A Heuristic Approach to Assist Side Channel Analysis of the Data Encryption Standard (Q2803642) (← links)
- Improving the Big Mac Attack on Elliptic Curve Cryptography (Q2803645) (← links)
- Randomness Testing: Result Interpretation and Speed (Q2803647) (← links)
- A Fully-Digital Chaos-Based Random Bit Generator (Q2803650) (← links)
- Secure Application Execution in Mobile Devices (Q2803652) (← links)
- Hardware-Enforced Protection Against Buffer Overflow Using Masked Program Counter (Q2803655) (← links)
- Hierarchical Identities from Group Signatures and Pseudonymous Signatures (Q2803658) (← links)
- Secure ElGamal-Type Cryptosystems Without Message Encoding (Q2803659) (← links)
- Safe-Errors on SPA Protected Implementations with the Atomicity Technique (Q2803660) (← links)
- Clever Arbiters Versus Malicious Adversaries (Q2803661) (← links)
- Security Analysis of the Modular Enhanced Symmetric Role Authentication (mERA) Protocol (Q2803662) (← links)
- Crypto Santa (Q2803663) (← links)