1
Published 2019
Springer International Publishing
Table of Contents: ...ABE and CCA security -- Succinct arguments and secure messaging -- Obfuscation -- Block ciphers...

2
Published 2019
Springer International Publishing
Table of Contents: ...ABE and CCA security -- Succinct arguments and secure messaging -- Obfuscation -- Block ciphers...

3
Published 2019
Springer International Publishing
Table of Contents: ...ABE and CCA security -- Succinct arguments and secure messaging -- Obfuscation -- Block ciphers...

4
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Grøstl Compression Function, ECHO Permutation and AES Block Cipher -- Cryptanalyses of Narrow-Pipe Mode...

5
Published 2002
Springer Berlin Heidelberg
Table of Contents: ...Block Cipher Cryptanalysis -- New Results on Boomerang and Rectangle Attacks -- Multiplicative...

6
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Attacks and Practical Collision Detection -- Block Ciphers -- New Related-Key Boomerang Attacks on AES...

7
Published 2005
Springer Berlin Heidelberg
Table of Contents: ... and Cryptanalysis of Block Ciphers...

8
Published 2024
Springer Nature Switzerland
Table of Contents: ... Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher -- Post-Quantum Analysis...

9
Published 1998
Springer Berlin Heidelberg
Table of Contents: ...Trends in the Fight Against Computer-Related Delinquency -- Block Ciphers —A Survey...

10
by Daemen, Joan, Rijmen, Vincent
Published 2002
Springer Berlin Heidelberg
Table of Contents: .... Related Block Ciphers -- Appendices -- A. Propagation Analysis in Galois Fields -- A.1.1 Difference...

11
by Daemen, Joan, Rijmen, Vincent
Published 2020
Springer Berlin Heidelberg
...This is the authoritative guide to Rijndael, the block cipher whose elegance, efficiency, security...