Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
![]() |
On the security of TrCBCChakraborty, Debrup ; Kundu, SamirInformation processing letters, 2023-01, Vol.179, p.106320, Article 106320 [Periódico revisado por pares]Elsevier B.VTexto completo disponível |
2 |
Material Type: Artigo
|
![]() |
QCovSML: A reliable COVID-19 detection system using CBC biomarkers by a stacking machine learning modelRahman, Tawsifur ; Khandakar, Amith ; Abir, Farhan Fuad ; Faisal, Md Ahasan Atick ; Hossain, Md Shafayet ; Podder, Kanchon Kanti ; Abbas, Tariq O. ; Alam, Mohammed Fasihul ; Kashem, Saad Bin ; Islam, Mohammad Tariqul ; Zughaier, Susu M. ; Chowdhury, Muhammad E.H.Computers in biology and medicine, 2022-04, Vol.143, p.105284-105284, Article 105284 [Periódico revisado por pares]United States: Elsevier LtdTexto completo disponível |
3 |
Material Type: Ata de Congresso
|
![]() |
Lucky Thirteen: Breaking the TLS and DTLS Record ProtocolsAl Fardan, N. J. ; Paterson, K. G.2013 IEEE Symposium on Security and Privacy, 2013, p.526-540IEEETexto completo disponível |
4 |
Material Type: Artigo
|
![]() |
High-throughput and area-efficient architectures for image encryption using PRINCE cipherKumar, Abhiram ; Singh, Pulkit ; Patro, K Abhimanyu Kumar ; Acharya, BibhudendraIntegration (Amsterdam), 2023-05, Vol.90, p.224-235 [Periódico revisado por pares]Elsevier B.VTexto completo disponível |
5 |
Material Type: Artigo
|
![]() |
Algorithm 958: Lattice Builder: A General Software Tool for Constructing Rank-1 Lattice RulesL'ecuyer, Pierre ; Munger, DavidACM transactions on mathematical software, 2016-06, Vol.42 (2), p.1-30 [Periódico revisado por pares]Texto completo disponível |
6 |
Material Type: Artigo
|
![]() |
Lightweight image encryption algorithm using NLFSR and CBC modeKumari, Punam ; Mondal, BhaskarThe Journal of supercomputing, 2023-11, Vol.79 (17), p.19452-19472 [Periódico revisado por pares]New York: Springer USTexto completo disponível |
7 |
Material Type: Artigo
|
![]() |
How to Formalize Loop Iterations in Cryptographic Protocols Using ProVerifMieno, Takehiko ; Okazaki, Hiroyuki ; Arai, Kenichi ; Futa, YuichiIEEE access, 2024, Vol.12, p.31605-31625 [Periódico revisado por pares]IEEETexto completo disponível |
8 |
Material Type: Artigo
|
![]() |
A Survey on Authenticated Encryption--ASIC Designer’s PerspectiveKavun, Elif Bilge ; Mihajloska, Hristina ; Yalçin, TolgaACM computing surveys, 2018-11, Vol.50 (6), p.1-21 [Periódico revisado por pares]Baltimore: Association for Computing MachineryTexto completo disponível |
9 |
Material Type: Ata de Congresso
|
![]() |
Practical Decryption exFiltration: Breaking PDF EncryptionMüller, Jens ; Ising, Fabian ; Mladenov, Vladislav ; Mainka, Christian ; Schinzel, Sebastian ; Schwenk, JörgProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019, p.15-29New York, NY, USA: ACMTexto completo disponível |
10 |
Material Type: Artigo
|
![]() |
Revisiting Randomness Extraction and Key Derivation Using the CBC and Cascade ModesBalachandran, Niranjan ; Jha, Ashwin ; Nandi, Mridul ; Pal, SoumitIACR Transactions on Symmetric Cryptology, 2023-12, Vol.2023 (4), p.391-419 [Periódico revisado por pares]Ruhr-Universität BochumTexto completo disponível |