skip to main content
Resultados 1 2 3 4 5 next page
Result Number Material Type Add to My Shelf Action Record Details and Options
1
Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance
Material Type:
Artigo
Adicionar ao Meu Espaço

Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance

Rogaway, Phillip ; Shrimpton, Thomas Roy, Bimal ; Meier, Willi

Fast Software Encryption, 2004, p.371-388 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

2
How to Compose Presburger-Accelerations: Applications to Broadcast Protocols
Material Type:
Artigo
Adicionar ao Meu Espaço

How to Compose Presburger-Accelerations: Applications to Broadcast Protocols

Finkel, Alain ; Leroux, Jérôme Agrawal, Manindra ; Seth, Anil

FST TCS 2002: Foundations of Software Technology and Theoretical Computer Science, 2002, p.145-156 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

3
A New Class of Collision Attacks and Its Application to DES
Material Type:
Artigo
Adicionar ao Meu Espaço

A New Class of Collision Attacks and Its Application to DES

Schramm, Kai ; Wollinger, Thomas ; Paar, Christof Johansson, Thomas

Fast Software Encryption, 2003, p.206-222 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

4
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering
Material Type:
Artigo
Adicionar ao Meu Espaço

Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering

GENNARO, Rosario ; LYSYANSKAYA, Anna ; MALKIN, Tal ; MICALI, Silvio ; RABIN, Tal

Lecture notes in computer science, 2004, p.258-277 [Periódico revisado por pares]

Berlin: Springer

Texto completo disponível

5
Efficient implementation of rijndael Encryption in reconfigurable hardware: Improvements and design tradeoffs
Material Type:
Artigo
Adicionar ao Meu Espaço

Efficient implementation of rijndael Encryption in reconfigurable hardware: Improvements and design tradeoffs

STANDAERT, Francois-Xavier ; ROUVROY, Gael ; QUISQUATER, Jean-Jacques ; LEGAT, Jean-Didier

Lecture notes in computer science, 2003, p.334-350 [Periódico revisado por pares]

Berlin: Springer

Texto completo disponível

6
A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
Material Type:
Artigo
Adicionar ao Meu Espaço

A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher

Paul, Souradyuti ; Preneel, Bart Roy, Bimal ; Meier, Willi

Fast Software Encryption, 2004, p.245-259 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

7
Rabbit: A New High-Performance Stream Cipher
Material Type:
Artigo
Adicionar ao Meu Espaço

Rabbit: A New High-Performance Stream Cipher

Boesgaard, Martin ; Vesterager, Mette ; Pedersen, Thomas ; Christiansen, Jesper ; Scavenius, Ove Johansson, Thomas

Fast Software Encryption, 2003, p.307-329 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

8
A Length-Flexible Threshold Cryptosystem with Applications
Material Type:
Artigo
Adicionar ao Meu Espaço

A Length-Flexible Threshold Cryptosystem with Applications

Damgård, Ivan ; Jurik, Mads Safavi-Naini, Rei ; Seberry, Jennifer

Information Security and Privacy, 2003, p.350-364 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

9
Differential Fault Analysis on AES Key Schedule and Some Countermeasures
Material Type:
Artigo
Adicionar ao Meu Espaço

Differential Fault Analysis on AES Key Schedule and Some Countermeasures

Chen, Chien-Ning ; Yen, Sung-Ming Safavi-Naini, Rei ; Seberry, Jennifer

Information Security and Privacy, 2003, p.118-129 [Periódico revisado por pares]

Berlin, Heidelberg: Springer Berlin Heidelberg

Texto completo disponível

10
Efficient countermeasures against RPA, DPA, and SPA
Material Type:
Artigo
Adicionar ao Meu Espaço

Efficient countermeasures against RPA, DPA, and SPA

MAMIYA, Hideyo ; MIYAJI, Atsuko ; MORIMOTO, Hiroaki

Lecture notes in computer science, 2004, p.343-356 [Periódico revisado por pares]

Berlin: Springer

Texto completo disponível

Resultados 1 2 3 4 5 next page

Personalize Seus Resultados

  1. Editar

Refine Search Results

Expandir Meus Resultados

  1.   

Data de Publicação 

De até
  1. Antes de1995  (1)
  2. 1995Até1999  (1)
  3. 2000Até2000  (10)
  4. 2001Até2002  (51)
  5. Após 2002  (155)
  6. Mais opções open sub menu

Buscando em bases de dados remotas. Favor aguardar.