Search alternatives:
"cryptanalyst" » "cryptanalysis", "kryptanalyse", "cryptanalytic"
"cryptoanalysis" » "cryptanalysis", "cryptanalytic"

1
by Clabby, John F.
Published 2007
Center for Cryptologic History, National Security Agency
...A biography of Brigadier John Tiltman, cryptanalyst extraordinaire, whose work proved...

2
Published 2018
Springer International Publishing
Table of Contents: ...-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing...

3
Published 2018
Springer International Publishing
Table of Contents: ...-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing...

4
Published 2018
Springer International Publishing
Table of Contents: ...-preserving encryption -- Cryptoanalysis -- Searchable encryption and differential privacy -- Secret sharing...

5
Published 2022
Springer Nature Switzerland
Table of Contents: ...Signatures -- Commitments -- Theory -- Cryptoanalysis -- Quantum Cryptography...

7
by Underhill, Ken
Published 2022
Packt Publishing, Limited
Table of Contents: ... Cryptographer/Cryptanalyst GRC/Privacy Analyst Security Auditor Malware Analyst Cybersecurity Manager...

8
by Dooley, John F.
Published 2013
Springer International Publishing
... cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer...

9
Published 2022
Springer Nature Switzerland
...; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography...

10
Published 2022
Springer Nature Switzerland
...; lattice cryptoanalysis. Part IV: Signatures; commitments; theory; cryptoanalysis; and quantum cryptography...

11
Published 2017
Springer International Publishing
Table of Contents: ... of Cryptanalysts to Come -- Security from Disjoint Paths: Is It Possible? -- End to End Security Is Not Enough...

12
by Knudsen, Lars R., Robshaw, Matthew
Published 2011
Springer Berlin Heidelberg
... and give insights into their design. They then consider the role of the cryptanalyst, the adversary...

13
by Salomaa, Arto
Published 1996
Springer Berlin Heidelberg
..., and protocols - as well as a comprehensive introduction to classical cryptography and cryptoanalysis. The second...

14
Published 2019
Springer International Publishing
... are organized in topical sections on cryptoanalysis, symmetric cryptography, ide-channel cryptography, post...

15
Published 2023
Manning Publications
.... Threat modeling. Security models. Cryptoanalysis. And so much more! We cover a lot of topics here...

16
Published 2013
Springer Berlin Heidelberg
... in technical sessions, covering topics of Cryptoanalysis, RSA, Lattices and Security Proofs, Public Key...

17
Published 1986
Springer Berlin Heidelberg
Table of Contents: ...? (Preliminary Abstract) -- Two New Secret Key Cryptosystems -- Cryptanalysts Representation of Nonlinearly...

18
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... with Applications to Elliptic Curve Cryptography -- Cryptoanalysis -- Related-Key Attacks on the Py-Family...

19
Published 1998
Springer Berlin Heidelberg
... submissions. Among the topics covered are public-key cryptosystems, cryptoanalysis, digital signatures...

20
by Booch, Grady
Published 2007
Addison-Wesley