The following pages link to Research in Cryptology (Q2920404):
Displaying 22 items.
- Broadcast Attacks against Code-Based Schemes (Q2920405) (← links)
- On the Security of Hummingbird-2 against Side Channel Cube Attacks (Q2920406) (← links)
- Full Lattice Basis Reduction on Graphics Cards (Q2920408) (← links)
- Breaking DVB-CSA (Q2920411) (← links)
- On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks (Q2920412) (← links)
- ${\Gamma\mbox{-MAC}\lbrack H,P\rbrack}$ - A New Universal MAC Scheme (Q2920413) (← links)
- New Universal Hash Functions (Q2920414) (← links)
- Cryptanalysis of TWIS Block Cipher (Q2920416) (← links)
- RSA Vulnerabilities with Small Prime Difference (Q2920418) (← links)
- Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2 k ) (Q2920421) (← links)
- A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services (Q5504545) (← links)
- The GPS Identification Scheme Using Frobenius Expansions (Q5504546) (← links)
- Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256 (Q5504547) (← links)
- Efficient Hash Collision Search Strategies on Special-Purpose Hardware (Q5504548) (← links)
- Cryptography Based on Quadratic Forms: Complexity Considerations (Q5504549) (← links)
- Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme (Q5504550) (← links)
- Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups (Q5504552) (← links)
- Preimages for Reduced-Round Tiger (Q5504553) (← links)
- Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts (Q5504554) (← links)
- Combiner Driven Management Models and Their Applications (Q5504556) (← links)
- New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B (Q5504557) (← links)
- Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation (Q5504558) (← links)