Wyniki wyszukiwania
Lecture Notes in Computer Science > Information Hiding > Attack > 258-272
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2008 > Block Ciphers > 294-307
Lecture Notes in Computer Science > Information Hiding > Theory > 319-328
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2005 > Cryptanalysis II > 197-208
Lecture Notes in Computer Science > Advances in Cryptology - EUROCRYPT 2009 > Cryptanalysis > 300-312
Lecture Notes in Computer Science > Progress in Cryptology — INDOCRYPT 2002 > Fingerprinting and Watermarking > 135-148
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2008 > Stream Ciphers > 40-52
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2004 > Block Ciphers > 206-217
Lecture Notes in Computer Science > Progress in Cryptology – INDOCRYPT 2011 > Secret-Key Cryptography, Part 1 > 114-133
Lecture Notes in Computer Science > Digital Rights Management. Technologies, Issues, Challenges and Systems > Supporting Cryptographic Technology > 228-245
Lecture Notes in Computer Science > Fast Software Encryption > Stream Cipher Cryptanalysis > 111-128
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2003 > Symmetric Key Cryptanalysis II > 617-630
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2011 > Hash Function > 252-269
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Cryptanalysis > 226-238