Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: (masks OR marks)
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Retain my current filters
author_facet:"Yung, Moti"
Search alternatives
:
masks »
tasks
marks »
markt
Showing
1
-
14
of
14
Search:
'(masks OR marks)'
,
query time: 0.21s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Information Security and Cryptology : Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings
Published 2006
Springer Berlin Heidelberg
Table of Contents:
“
... Security Policy Model and Its Realization Mechanism -- Packet
Marking
Based Cooperative Attack Response...
”
Read Now
2
Applied Cryptography and Network Security : 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008, Proceedings
Published 2008
Springer Berlin Heidelberg
Table of Contents:
“
... *, an Efficient Left-to-Right Signed Digit Recoding Algorithm -- A Very Compact “Perfectly
Masked
” S-Box for AES...
”
Read Now
3
Information Security and Cryptology : 18th International Conference, Inscrypt 2022, Beijing, China, December 11–13, 2022, Revised Selected Papers
Published 2023
Springer Nature Switzerland
Table of Contents:
“
... functions with few Walsh transform values -- Stream ciphers -- Higher-Order
Masking
Scheme for Trivium...
”
Read Now
4
Information Security Applications : 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers
Published 2009
Springer Berlin Heidelberg
Table of Contents:
“
... behind the
Mask
: Power Analysis on a Provably Secure S-Box Implementation -- A Comparative Study...
”
Read Now
5
Information Security Applications : 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers
Published 2009
Springer Berlin Heidelberg
Table of Contents:
“
...Smart Card and Secure Hardware(1) -- Using Templates to Attack
Masked
Montgomery Ladder...
”
Read Now
6
Digital Rights Management : Technologies, Issues, Challenges and Systems
Published 2006
Springer Berlin Heidelberg
“
... hope that this ?rst conference
marks
the beginning of a fruitful and useful series of future...
”
Read Now
7
Applied Cryptography and Network Security : 8th International Conference, ACNS 2010, Beijing, China, June 22-25, 2010, Proceedings
Published 2010
Springer Berlin Heidelberg
Table of Contents:
“
... -- Secure Multiplicative
Masking
of Power Functions --...
”
Read Now
8
Progress in Cryptology – INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings
Published 2007
Springer Berlin Heidelberg
Table of Contents:
“
... Resistant
Masked
AES S-Box -- LFSR Based Stream Ciphers Are Vulnerable to Power Attacks -- An Update...
”
Read Now
9
Information Security and Cryptology : 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers
Published 2009
Springer Berlin Heidelberg
Table of Contents:
“
... -- Wireless Network Security -- A Novel
Marking
Probability Distribution Using Probability Propagation...
”
Read Now
10
Advances in Cryptology - CRYPTO 2002 : 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings
Published 2002
Springer Berlin Heidelberg
Table of Contents:
“
... -- Cryptanalysis of Stream Ciphers with Linear
Masking
-- The Filter-Combiner Model for Memoryless Synchronous...
”
Read Now
11
Applied Cryptography and Network Security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004. Proceedings
Published 2004
Springer Berlin Heidelberg
Table of Contents:
“
... -- Advanced Packet
Marking
Mechanism with Pushback for IP Traceback -- A Parallel Intrusion Detection System...
”
Read Now
12
Information and Communications Security : 25th International Conference, ICICS 2023, Tianjin, China, November 18–20, 2023, Proceedings
Published 2023
Springer Nature Singapore
Table of Contents:
“
... Multi-Identity Recognition of Darknet Vendors -- Crypto
Mask
: Privacy-preserving Face Recognition...
”
Read Now
13
Security and Cryptography for Networks : 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings
Published 2006
Springer Berlin Heidelberg
“
..., on September 6-8, 2006. The conference was the ?fth in the SCN series, and this year
marked
a change in its...
”
Read Now
14
Stabilization, Safety, and Security of Distributed Systems : 12th International Symposium, SSS 2010, New York, NY, USA, September 20-22, 2010, Proceedings
Published 2010
Springer Berlin Heidelberg
“
.... Research in distributed systems is now at a crucial point in its evolution,
marked
by the importance...
”
Back
Narrow Search
Remove Filters
Clear Filter
Author: Yung, Moti
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
12
004 - Data processing & computer science
2
003 - Systems
1
Language
English
14
Collection
Springer eBooks 2005-
12
Springer Book Archives -2004
2
Author
Yung, Moti
Zhou, Jianying
2
Bellovin, Steven M.
1
Chen, Xiaofeng
1
Cobb, Jorge
1
De Prisco, Roberto
1
more ...
Deng, Yi
1
Dolev, Shlomi
1
Fischer, Michael
1
Gennaro, Rosario
1
Jakobsson, Markus
1
Keromytis, Angelos D.
1
Lin, Dongdai
1
Lin, Donghai
1
Lipmaa, Helger
1
Liu, Peng
1
Liu, Zheli
1
Pandu Rangan, C.
1
Safavi-Naini, Reihaneh
1
Sohn, Kiwook
1
Srinathan, K.
1
Wang, Ding
1
Youm, Heung Youl
1
see all ...
less ...
Recently Uploaded
Last Month
1
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?filter%5B%5D=author_facet%3A%22Yung%2C+Moti%22&lookfor=%28masks+OR+marks%29&type=AllFields
Send by Email
×
Loading...