1
by Bard, Gregory
Published 2009
Springer US
Table of Contents: ...Introduction: How to Use this Book -- Cryptanalysis -- The Block Cipher Keeloq and Algebraic...

2
by Swenson, Christopher
Published 2008
Wiley Pub.
Table of Contents: ... -- General cryptanalytic methods -- Linear cryptanalysis -- Differential cryptanalysis...

3
by Dooley, John F.
Published 2018
Springer International Publishing

4
by Mukherjee, Chandra Sekhar, Roy, Dibyendu, Maitra, Subhamoy
Published 2021
Springer Nature Singapore
... study on design and cryptanalysis of ZUC as well as relevant research results in this field...

5 ...Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes...

6 Table of Contents: ...: Big Data Cryptography -- Chapter 17: Cloud Computing Cryptography -- Part III: Pro Cryptanalysis...

7 Table of Contents: .... PART 3 – PRO CRYPTANALYSIS. 16. Introduction to Cryptanalysis -- 17. General notions for Conducting...

8 ...Here is your in-depth guide to cryptography and cryptanalysis in Java. This book includes...

9 ...Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use...

10 Table of Contents: ...: Introduction -- Cryptography and Cryptanalysis -- Book Structure -- Conclusion -- References -- Chapter 2: JDK...

11 Table of Contents: ...: Big Data Cryptography -- Chapter 17: Cloud Computing Cryptography -- Part III: Pro Cryptanalysis...

12 Table of Contents: ... -- Caesar Cipher -- Implementation -- Cryptanalysis -- Vigenère Cipher -- Implementation -- Cryptanalysis...

13 Table of Contents: ... Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17...

14
by Biham, Eli, Shamir, Adi
Published 1993
Springer New York
Table of Contents: ...1 Introduction -- 2 Results -- 3 Introduction to Differential Cryptanalysis -- 3.1 Notations...

15 Table of Contents: ... Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17...

16 Table of Contents: ... Cryptography -- 15: Big Data Cryptography16:Cloud Computing Cryptography -- Part III: Pro Cryptanalysis -- 17...

17
by Nakahara Jr., Jorge
Published 2018
Springer International Publishing
... on the description of the PES, IDEA and other related ciphers, followed by a chapter on cryptanalysis...

18
by Nachef, Valerie, Patarin, Jacques, Volte, Emmanuel
Published 2017
Springer International Publishing
Table of Contents: ... -- Chapter 4 The coefficient H method -- Part 2 Generic Attacks -- Chapter 5 Introduction to cryptanalysis...

19
by Bannier, Arnaud
Published 2017
IntechOpen
Subjects: ...cryptography, cryptanalysis, block ciphers, substitution-permutation network, backdoor...

20
by González Vasco, María Isabel
Published 2020
MDPI - Multidisciplinary Digital Publishing Institute
Subjects: ...cryptanalysis...