41
Published 2017
Springer International Publishing
Table of Contents: ... in cryptanalysis -- Primitives and features; cryptanalysis correspondence...

42
Published 2012
Springer Berlin Heidelberg
Table of Contents: ...Block ciphers -- Differential cryptanalysis -- Hash functions -- Modes of operation -- New tools...

43
Published 2022
Springer International Publishing
Table of Contents: ...Foundation -- Symmetric Key Cryptology -- Protocols and Implementation -- Cryptanalysis -- Boolean...

44
Published 2023
Springer International Publishing
Table of Contents: ...Cryptographic Implementations -- Quantum Cryptanalysis -- Advanced Public-Key Encryption -- Tools...

45
Published 2008
Springer Berlin Heidelberg
Table of Contents: ...Hash Function Cryptanalysis -- Security of MD5 Challenge and Response: Extension of APOP Password...

46
Published 1999
Springer Berlin Heidelberg
Table of Contents: ... -- Cryptanalysis of RC4-like Ciphers -- Cryptographic Systems -- Key Preassigned Traceability Schemes for Broadcast...

47
Published 1995
Springer Berlin Heidelberg
Table of Contents: ... attack -- A known plaintext attack on the PKZIP stream cipher -- Linear cryptanalysis of stream ciphers...

48
Published 2023
Springer Nature Switzerland
Table of Contents: ... -- Lattice-Based Cryptography -- Multivariate Cryptography -- Quantum Algorithms, Cryptanalysis and Models...

49
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... -- Resettably Secure Computation -- On the Security Loss in Cryptographic Reductions -- Hash Cryptanalysis...

50
Published 1993
Springer Berlin Heidelberg
Table of Contents: ...-closure-test on FEAL -- IC-cards and telecommunication services -- Cryptanalysis of several conference key...

51
Published 2018
Springer International Publishing
Table of Contents: ...Post-Quantum Cryptanalysis -- Encrypted Storage -- Symmetric-Key Constructions -- Lattice...

52
Published 2018
Springer International Publishing
Table of Contents: ... Cryptography and Cryptanalysis -- Symmetric Key Cryptanalysis -- Theory -- Secure Computations and Protocols...

53
Published 2019
Springer International Publishing
Table of Contents: ...Public-Key Primitives -- Cryptanalysis on Public-Key Primitives -- Cryptographic Protocols...

54
Published 2022
Springer Nature Switzerland
Table of Contents: ...Signatures -- Idealized Models -- Lower Bounds -- Cryptanalysis II -- Distributed Algorithms...

55
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Functions Analysis I -- Cryptanalysis of RadioGatún -- Preimage Attacks on Reduced Tiger and SHA-2...

56
Published 1994
Springer Berlin Heidelberg
Table of Contents: ...Block Ciphers: Differential and Linear Cryptanalysis -- The First Experimental Cryptanalysis...

57
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Cryptanalysis of Multivariate Systems -- Properties of the Discrete Differential with Cryptographic...

58
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage...

59
Published 2013
Springer Berlin Heidelberg
Table of Contents: ...-Party Computation -- Cryptographic Primitives -- Analysis, Cryptanalysis and Passwords -- Leakage...

60
by Sigmon, Richard Klima. Neil
Published 2012
Chapman and Hall/CRC
...?Substitution Ciphers Keyword Substitution Ciphers A Maplet for Substitution Ciphers Cryptanalysis...