61
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Using Hill Climbing -- Speeding Up the Wide-Pipe: Secure and Fast Hashing -- Attacks on Block Ciphers...

62
Published 2000
Springer Berlin Heidelberg
Table of Contents: ... -- Cryptanalysis of the A5/1 GSM Stream Cipher -- Cryptanalysis II : Block Ciphers -- On Bias Estimation in Linear...

63
by Khlebnikov, Alexei
Published 2022
Packt Publishing, Limited
Table of Contents: ...Other block cipher operation modes -- Choosing the block cipher operation mode -- Padding for block...

64
Published 2009
Springer Berlin Heidelberg
Table of Contents: ...Invited Talk -- The Future of Cryptographic Algorithms -- Block Cipher -- Bit-Free Collision...

65
Published 2016
Springer Berlin Heidelberg
Table of Contents: ... -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable...

66
Published 2016
Springer Berlin Heidelberg
Table of Contents: ... -- Block Cipher -- SCA and Leakage Resilience -- Zero Knowledge -- Post Quantum Cryptography -- Provable...

67
Published 2013
Springer Berlin Heidelberg
... cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block...

68
by Meijer, Alko R.
Published 2016
Springer International Publishing
Table of Contents: ... Ciphers -- Boolean Functions -- Applications to Block Ciphers -- Number Theory in Public Key Cryptography...

69
Published 1993
Springer Berlin Heidelberg
Table of Contents: ...-free -- FFT-Hash II, Efficient Cryptographic Hashing -- Hash Functions Based on Block Ciphers...

70
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... Grøstl Compression Function, ECHO Permutation and AES Block Cipher -- Cryptanalyses of Narrow-Pipe Mode...

71 Table of Contents: ... Implementation of Hash Functions -- General Guidelines for Implementing Block Ciphers in FPGAs -- Architectural...

72
Published 1998
Springer Berlin Heidelberg
Table of Contents: ... -- Cryptanalytic Attacks on Pseudorandom Number Generators -- New Block Ciphers -- CS-Cipher -- On the Design...

73
Published 2019
Springer International Publishing
Table of Contents: ... with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher...

74
Published 2015
Springer International Publishing
Table of Contents: ... -- Fault Analysis on SIMON Family of Lightweight Block Ciphers -- A Clustering Approach for Privacy...

75
Published 2024
Springer International Publishing
Table of Contents: ... Elliptic Curves -- 5 Block Ciphers -- Finding All Impossible Differentials When Considering the DDT -- A...

76
Published 2011
Springer Berlin Heidelberg
... and models, stream ciphers, block ciphers and modes, as well as linear and differential cryptanalysis...

77
Published 2012
Springer Berlin Heidelberg
Table of Contents: ... Universal MAC Scheme -- New Universal Hash Functions -- Cryptanalysis of TWIS Block Cipher -- RSA...

78
Published 2015
Springer Berlin Heidelberg
Table of Contents: ... and IO -- Pseudorandomness -- Block cipher cryptanalysis -- Integrity -- Assumptions -- Hash functions...

79
Published 2015
Springer Berlin Heidelberg
Table of Contents: ... and IO -- Pseudorandomness -- Block cipher cryptanalysis -- Integrity -- Assumptions -- Hash functions...

80
Published 2009
Springer Berlin Heidelberg
Table of Contents: ... -- Cryptanalysis I -- Linear (Hull) and Algebraic Cryptanalysis of the Block Cipher PRESENT -- Saturation Attack...