Search results
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2005 > Stream Cipher Cryptanalysis > 412-424
Lecture Notes in Computer Science > Applied Cryptography and Network Security > Session 7: Encryption > 327-344
Lecture Notes in Computer Science > Topics in Cryptology – CT-RSA 2007 > Symmetric-Key Encryption > 1-19
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2007 > Cryptanalysis II > 395-411
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2009 > Hash Functions I > 144-161
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems - CHES 2006 > Side Channels II > 201-215
Lecture Notes in Computer Science > Fast Software Encryption > Stream Cipher Cryptanalysis (II) > 462-469
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2003 > Cryptanalysis III > 477-490
Lecture Notes in Computer Science > Distributed Computing - IWDC 2004 > Session III A: Information Security > 219-230
Lecture Notes in Computer Science > Information Security and Cryptology – ICISC 2008 > Public Key Encryption > 37-51
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 99 > Differential Power Analysis > 388-397
Lecture Notes in Computer Science > Progress in Cryptology - INDOCRYPT 2006 > Symmetric Cryptography: Attacks > 48-62