1
by Bard, Gregory
Published 2009
Springer US
Table of Contents: ...Introduction: How to Use this Book -- Cryptanalysis -- The Block Cipher Keeloq and Algebraic...

2 Table of Contents: ...: Big Data Cryptography -- Chapter 17: Cloud Computing Cryptography -- Part III: Pro Cryptanalysis...

3
by Dooley, John F.
Published 2018
Springer International Publishing

4
by Mukherjee, Chandra Sekhar, Roy, Dibyendu, Maitra, Subhamoy
Published 2021
Springer Nature Singapore
... study on design and cryptanalysis of ZUC as well as relevant research results in this field...

5 ...Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes...

6 Table of Contents: .... PART 3 – PRO CRYPTANALYSIS. 16. Introduction to Cryptanalysis -- 17. General notions for Conducting...

7 Table of Contents: ... Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17...

8 Table of Contents: ... Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17...

9
by Nakahara Jr., Jorge
Published 2018
Springer International Publishing
... on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis...

10
by Nachef, Valerie, Patarin, Jacques, Volte, Emmanuel
Published 2017
Springer International Publishing
Table of Contents: ... -- Chapter 4 The coefficient H method -- Part 2 Generic Attacks -- Chapter 5 Introduction to cryptanalysis...

11
Published 2016
Springer Berlin Heidelberg
Table of Contents: ...Operating modes -- Stream-cipher cryptanalysis -- Components -- Side-channels and implementations...

12
Published 2015
Springer Berlin Heidelberg
Table of Contents: ...Block cipher cryptanalysis -- Understanding attacks -- Implementation issues -- More block cipher...

13
Published 2008
Springer Berlin Heidelberg
Table of Contents: ...New Techniques for Cryptanalysis of Hash Functions and Improved Attacks on Snefru -- Stream Cipher...

14
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...Hash Function Cryptanalysis and Design (I) -- Producing Collisions for Panama, Instantaneously...

15
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...Cryptanalysis – I -- Cryptanalysis of a Hash Function Proposed at ICISC 2006 -- Cryptanalysis...

16
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...Block Cipher Cryptanalysis -- Improved DST Cryptanalysis of IDEA -- Improved Related-Key Impossible...

17
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A...

18
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Hash Functions I -- Practical Collisions for SHAMATA-256 -- Improved Cryptanalysis of the Reduced...

19
Published 2011
Springer Berlin Heidelberg
Table of Contents: .... Cryptanalysis of chaotic ciphers   -- 8. Lessons learnt from the cryptanalysis of chaos-based ciphers   --   9...

20
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Stream Ciphers and Block Ciphers -- Cryptanalysis of the DECT Standard Cipher -- Improving...