Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "SHA-3"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Search alternatives
:
sha »
shaw
,
shah
Showing
1
-
20
of
28
Search:
'"SHA-3"'
,
query time: 0.12s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
Cybersecurity and Data Science
by
Szczypiorski, Krzysztof
Published 2023
MDPI - Multidisciplinary Digital Publishing Institute
Subjects:
“
...
SHA
-
3
...
”
Read Now
2
Cryptographic Hardware and Embedded Systems -- CHES 2010 : 12th International Workshop, Santa Barbara, USA, August 17-20,2010, Proceedings
Published 2010
Springer Berlin Heidelberg
Table of Contents:
“
... of Six
SHA
-
3
Candidates -- Tamper Resistance and Hardware Trojans -- Flash Memory ‘Bumping’ Attacks...
”
Read Now
3
Understanding Cryptography : From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms
by
Paar, Christof
,
Pelzl, Jan
,
Güneysu, Tim
Published 2024
Springer Berlin Heidelberg
Table of Contents:
“
... on the Discrete Logarithm Problem -- Elliptic curve Cryptosystems -- Digital Signatures -- Hash Functions --
SHA
-
3
...
”
Read Now
4
Model Checking Software : 28th International Symposium, SPIN 2022, Virtual Event, May 21, 2022, Proceedings
Published 2022
Springer International Publishing
Table of Contents:
“
... Guided Safety Repair of Deep Neural Networks -- Verifying the
SHA
-
3
Implementation from OpenSSL...
”
Read Now
5
Open Problems in Network Security : IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers
Published 2016
Springer International Publishing
Table of Contents:
“
... for the Zettabyte era Use case: Incremental Hash Functions Based on
SHA
-
3
-- The Quest for Scalable Blockchain...
”
Read Now
6
Computational nanotechnology using finite difference time domain
Published 2014
CRC Press
Table of Contents:
“
.... Xiong and Wei E.I.
Sha
--
3
. Modeling of optical metamaterials using the FDTD method / Yan Zhao -- 4...
”
Call Number:
TA1530
Read Now
7
Microelectronics, Electromagnetics and Telecommunications : Proceedings of the Fifth ICMEET 2019
Published 2021
Springer Nature Singapore
Table of Contents:
“
... -- Impact Analysis of Black Hole, Flooding Attacks and Enhancements inMANET Using
SHA
3
Keccak...
”
Read Now
8
Fast Software Encryption : 16th International Workshop, FSE 2009 Leuven, Belgium, February 22-25, 2009 Revised Selected Papers
Published 2009
Springer Berlin Heidelberg
Table of Contents:
“
... of Matsui’s Algorithm 2 -- Hash Functions Analysis II -- Meet-in-the-Middle Attacks on
SHA
-
3
Candidates...
”
Read Now
9
Algorithmic Number Theory : 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010, Proceedings
Published 2010
Springer Berlin Heidelberg
Table of Contents:
“
... for Cunningham Numbers -- Visualizing Elements of
Sha
[
3
] in Genus 2 Jacobians -- On Weil Polynomials of K3...
”
Read Now
10
Topics in Cryptology - CT-RSA 2010 : The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings
Published 2010
Springer Berlin Heidelberg
Table of Contents:
“
...Invited Talk -- The First 30 Years of Cryptographic Hash Functions and the NIST
SHA
-
3
Competition...
”
Read Now
11
Cryptology and Network Security : 9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010, Proceedings
Published 2010
Springer Berlin Heidelberg
Table of Contents:
“
... of Certain Two-Call Hash Functions -- Integral Distinguishers of Some
SHA
-
3
Candidates -- Near-Collisions...
”
Read Now
12
Progress in Cryptology - AFRICACRYPT 2020 : 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20 – 22, 2020, Proceedings
Published 2020
Springer International Publishing
Table of Contents:
“
... -- New Results on the SymSum Distinguisher on Round-Reduced
SHA
3
.-Cryptanalysis of FlexAEAD -- BBB Secure...
”
Read Now
13
Selected Areas in Cryptography : 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers
Published 2013
Springer Berlin Heidelberg
Table of Contents:
“
... -- The Stafford Tavares Lecture Extracts from the
SHA
-
3
Competition -- Stream Ciphers Cryptanalysis of the “Kindle...
”
Read Now
14
Advances in Cryptology – CRYPTO 2021 : 41st Annual International Cryptology Conference, CRYPTO 2021, Virtual Event, August 16–20, 2021, Proceedings, Part III
Published 2021
Springer International Publishing
Table of Contents:
“
... with Algebraic Techniques -- The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and
SHA
-
3
...
”
Read Now
15
Computational Intelligence in Security for Information Systems 2010 : Proceedings of the 3rd International Conference on Computational Intelligence in Security for Information Syst...
Published 2010
Springer Berlin Heidelberg
Table of Contents:
“
... -- The Impact of the
SHA
-
3
Casting Cryptography Competition on the Spanish IT Market -- 7: Industrial...
”
Read Now
16
Progress in Cryptology - INDOCRYPT 2010 : 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings
Published 2010
Springer Berlin Heidelberg
Table of Contents:
“
...Near-Collisions for the Reduced Round Versions of Some Second Round
SHA
-
3
Compression Functions...
”
Read Now
17
Information and Communications Security : 10th International Conference, ICICS 2008 Birmingham, UK, October 20 - 22, 2008. Proceedings
Published 2008
Springer Berlin Heidelberg
Table of Contents:
“
... Vulnerability to Doubling Attacks -- Side Channel Analysis of Some Hash Based MACs: A Response to
SHA
-
3
...
”
Read Now
18
Information Security and Cryptology : 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers
Published 2009
Springer Berlin Heidelberg
Table of Contents:
“
...Invited Talks -- The State of Hash Functions and the NIST
SHA
-
3
Competition -- Key Evolution...
”
Read Now
19
Information Security : 12th International Conference, ISC 2009 Pisa, Italy, September 7-9, 2009 Proceedings
Published 2009
Springer Berlin Heidelberg
Table of Contents:
“
... Functions -- Structural Attacks on Two
SHA
-
3
Candidates: Blender-n and DCH-n -- Meet-in-the-Middle Attacks...
”
Read Now
20
Advances in Cryptology - ASIACRYPT 2009 : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009, Pro...
Published 2009
Springer Berlin Heidelberg
Table of Contents:
“
... Than Weak: Attacks on Concatenated Combiners -- The Intel AES Instructions Set and the
SHA
-
3
Candidates...
”
1
2
Back
Narrow Search
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
21
331 - Labor economics
3
004 - Data processing & computer science
2
500 - Natural sciences & mathematics
2
000 - Computer science, information & general works
1
003 - Systems
1
more ...
006 - Special computer methods
1
380 - Commerce, communications & transportation
1
400 - Language
1
518 - Numerical analysis
1
600 - Technology
1
620 - Engineering & allied operations
1
621 - Applied physics
1
see all ...
less ...
Language
English
27
German
1
Collection
Springer eBooks 2005-
21
O'Reilly
6
Directory of Open Access Books
1
Author
Yung, Moti
2
Adolfsen, Jarle
1
Alonso Alvarez, Ángel
1
Anguera, Jaume
1
Ardagna, Claudio Agostino
1
Aumasson, Jean-Philippe
1
more ...
Camenisch, Jan
1
Chakravarthy, V.V.S.S.S.
1
Chen, Liqun
1
Chowdary, P. Satish Rama
1
Corchado, Emilio
1
Delfs, Hans
1
Dhameja, Gautam
1
Diniz, Pedro C.
1
Dunkelman, Orr
1
Goi, Bok-Min
1
Gong, Guang
1
Gupta, Kishan Chand
1
Güneysu, Tim
1
Hanrot, Guillaume
1
Heng, Swee-Huay
1
Henzen, Luca
1
Herrero, Álvaro
1
Hübner, Michael
1
Kaufman, Charlie
1
Kesdoğan, Doğan
1
Khlebnikov, Alexei
1
Knebl, Helmut
1
Knudsen, Lars R.
1
Legunsen, Owolabi
1
Lin, Dongdai
1
Liu, Peng
1
Malkin, Tal
1
Mangard, Stefan
1
Martinelli, Fabio
1
Matsui, Mitsuri
1
Meier, Willi
1
Morain, Francois
1
Musa, Sarhan M.
1
Nitaj, Abderrahmane
1
Paar, Christof
1
Panda, Priyansu Sekhar
1
Peikert, Chris
1
Pelzl, Jan
1
Perlman, Radia
1
Perlner, Ray A.
1
Phan, Raphael C.-W.
1
Pieprzyk, Josef
1
Redondo Gil, Carlos
1
Rosu, Grigore
1
Ryan, Mark
1
Samarati, Pierangela
1
Sano, Kentaro
1
Satapathy, Suresh Chandra
1
Singhal, Bikramaditya
1
Soudris, Dimitrios
1
Speciner, Michael
1
Standaert, Francois-Xavier
1
Szczypiorski, Krzysztof
1
Thomé, Emmanuel
1
Wang, Guilin
1
Wong, David
1
Wright, Rebecca N.
1
Wu, Huapeng
1
Youssef, Amr
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?lookfor=%22SHA-3%22&type=AllFields
Send by Email
×
Loading...