1
by Swenson, Christopher
Published 2008
Wiley Pub.
Table of Contents: ... -- General cryptanalytic methods -- Linear cryptanalysis -- Differential cryptanalysis...

2
by Bard, Gregory
Published 2009
Springer US
Table of Contents: ...Introduction: How to Use this Book -- Cryptanalysis -- The Block Cipher Keeloq and Algebraic...

3 ...Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes...

4 ...Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use...

5 Table of Contents: .... PART 3 – PRO CRYPTANALYSIS. 16. Introduction to Cryptanalysis -- 17. General notions for Conducting...

6 Table of Contents: ... Cipher -- Implementation -- Cryptanalysis -- Vigenère Cipher -- Implementation -- Cryptanalysis -- Hill...

7
by Mukherjee, Chandra Sekhar, Roy, Dibyendu, Maitra, Subhamoy
Published 2021
Springer Nature Singapore
... study on design and cryptanalysis of ZUC as well as relevant research results in this field...

8 Table of Contents: ...: Big Data Cryptography -- Chapter 17: Cloud Computing Cryptography -- Part III: Pro Cryptanalysis...

9
by Dooley, John F.
Published 2018
Springer International Publishing

10 Table of Contents: ...: Big Data Cryptography -- Chapter 17: Cloud Computing Cryptography -- Part III: Pro Cryptanalysis...

11 Table of Contents: ... Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17...

12 Table of Contents: ... Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17...

13 Table of Contents: ... Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17...

14
by Biham, Eli, Shamir, Adi
Published 1993
Springer New York
Table of Contents: ...1 Introduction -- 2 Results -- 3 Introduction to Differential Cryptanalysis -- 3.1 Notations...

15
by Nakahara Jr., Jorge
Published 2018
Springer International Publishing
... on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis...

16
by Nachef, Valerie, Patarin, Jacques, Volte, Emmanuel
Published 2017
Springer International Publishing
Table of Contents: ... -- Chapter 4 The coefficient H method -- Part 2 Generic Attacks -- Chapter 5 Introduction to cryptanalysis...

17
by Bannier, Arnaud
Published 2017
IntechOpen
Subjects: ...cryptography, cryptanalysis, block ciphers, substitution-permutation network, backdoor...

18
by González Vasco, María Isabel
Published 2020
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...cryptanalysis...

19
by Heidari, Hadi
Published 2020
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...cryptanalysis...

20
by Sparavigna, Amelia Carolina
Published 2022
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...cryptanalysis...