Wyniki wyszukiwania
Lecture Notes in Computer Science > Advances in Cryptology – EUROCRYPT 2005 > Algebra and Number Theory II > 354-370
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2008 > Public-Key Cryptography > 174-190
Lecture Notes in Computer Science > Computational Science and Its Applications – ICCSA 2005 > Information Security and Hiding (ISH 2005) Workshop > 577-584
IFIP — The International Federation for Information Processing > Smart Card Research and Advanced Applications VI > Side Attacks > 127-142
Lecture Notes in Computer Science > Progress in Cryptology – AFRICACRYPT 2009 > Block Ciphers > 60-76
Lecture Notes in Computer Science > Fast Software Encryption > Hash Function Cryptanalysis (I) > 224-234
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Short Papers > 171-176
Lecture Notes in Computer Science > Cryptology and Network Security > Identification, Authentication and Key Management > 149-161
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2010 > Attacks on Block Ciphers and Stream Ciphers > 197-209
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2009 > Symmetric Cryptology > 119-135
Communications in Computer and Information Science > High Performance Architecture and Grid Computing > Theme - 3: Information Management and Network Security > 609-611
Lecture Notes in Computer Science > Selected Areas in Cryptography > Boolean Functions and Stream Ciphers > 196-213
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2004 > XL-Algorithms > 323-337
Lecture Notes in Computer Science > Information Security Applications > Public Key Crypto Applications > 115-129
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2005 > Stream Cipher Cryptanalysis > 395-411