Search alternatives:
sha » shaw, shah

1
by Szczypiorski, Krzysztof
Published 2023
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...SHA-3...

2
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... of Six SHA-3 Candidates -- Tamper Resistance and Hardware Trojans -- Flash Memory ‘Bumping’ Attacks...

3
by Paar, Christof, Pelzl, Jan, Güneysu, Tim
Published 2024
Springer Berlin Heidelberg
Table of Contents: ... on the Discrete Logarithm Problem -- Elliptic curve Cryptosystems -- Digital Signatures -- Hash Functions -- SHA-3...

4
Published 2022
Springer International Publishing
Table of Contents: ... Guided Safety Repair of Deep Neural Networks -- Verifying the SHA-3 Implementation from OpenSSL...

5
Published 2016
Springer International Publishing
Table of Contents: ... for the Zettabyte era Use case: Incremental Hash Functions Based on SHA-3 -- The Quest for Scalable Blockchain...

6
Published 2014
CRC Press
Table of Contents: .... Xiong and Wei E.I. Sha -- 3. Modeling of optical metamaterials using the FDTD method / Yan Zhao -- 4...

7
Published 2021
Springer Nature Singapore
Table of Contents: ... -- Impact Analysis of Black Hole, Flooding Attacks and Enhancements inMANET Using SHA3 Keccak...

8
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... of Matsui’s Algorithm 2 -- Hash Functions Analysis II -- Meet-in-the-Middle Attacks on SHA-3 Candidates...

9
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Invited Talk -- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition...

10
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... for Cunningham Numbers -- Visualizing Elements of Sha[3] in Genus 2 Jacobians -- On Weil Polynomials of K3...

11
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... of Certain Two-Call Hash Functions -- Integral Distinguishers of Some SHA-3 Candidates -- Near-Collisions...

12
Published 2020
Springer International Publishing
Table of Contents: ... -- New Results on the SymSum Distinguisher on Round-Reduced SHA3.-Cryptanalysis of FlexAEAD -- BBB Secure...

13
Published 2013
Springer Berlin Heidelberg
Table of Contents: ... -- The Stafford Tavares Lecture Extracts from the SHA-3 Competition -- Stream Ciphers Cryptanalysis of the “Kindle...

14
Published 2021
Springer International Publishing
Table of Contents: ... with Algebraic Techniques -- The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3...

15
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions...

16
Published 2008
Springer Berlin Heidelberg
Table of Contents: ... Vulnerability to Doubling Attacks -- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3...

17
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... -- The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Market -- 7: Industrial...

18
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Invited Talks -- The State of Hash Functions and the NIST SHA-3 Competition -- Key Evolution...

19
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Functions -- Structural Attacks on Two SHA-3 Candidates: Blender-n and DCH-n -- Meet-in-the-Middle Attacks...

20
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Than Weak: Attacks on Concatenated Combiners -- The Intel AES Instructions Set and the SHA-3 Candidates...