321 results on '"Robshaw, Matthew"'
Search Results
2. Differential Cryptanalysis: The Idea
3. Advanced Topics
4. Brute Force Attacks
5. Linear Cryptanalysis: The Idea
6. AES
7. Using Block Ciphers
8. DES
9. Introduction
10. The eSTREAM Project
11. On Related-Key Attacks and KASUMI: The Case of A5/3
12. PRINTcipher: A Block Cipher for IC-Printing
13. On Unbiased Linear Approximations
14. How to Encrypt with the LPN Problem
15. Looking Back at a New Hash Function
16. Good Variants of HB + Are Hard to Find
17. [Untitled]
18. Securing RSA-KEM via the AES
19. Ten Years of Information Security Masters Programmes : Reflections and New Challenges
20. Essential Algebraic Structure within the AES
21. Analysis of SHA-1 in Encryption Mode
22. On the Design and Security of RC2
23. Trapdoor One-Way Function
24. One-Way Function
25. The Block Cipher Companion
26. PRINTcipher: A Block Cipher for IC-Printing
27. On Unbiased Linear Approximations
28. An overview of RFID tags and new cryptographic developments
29. Good Variants of HB + Are Hard to Find
30. Securing RSA-KEM via the AES
31. Ten Years of Information Security Masters Programmes
32. Essential Algebraic Structure within the AES
33. Analysis of SHA-1 in Encryption Mode
34. On the Design and Security of RC2
35. Lightweight Cryptography and RFID: Tackling the Hidden Overhead
36. : Increasing the Security and Efficiency of.
37. Distinguishing Attacks on the Stream Cipher Py.
38. Resynchronization Attacks on WG and LEX.
39. Upper Bounds on Algebraic Immunity of Boolean Power Functions.
40. Chosen-Ciphertext Attacks Against MOSQUITO.
41. How Far Can We Go on the x64 Processors?
42. Computing the Algebraic Immunity Efficiently.
43. The Impact of Carries on the Complexity of Collision Attacks on SHA-1.
44. The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function.
45. A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation.
46. New Blockcipher Modes of Operation with Beyond the Birthday Bound Security.
47. A Study of the MD5 Attacks: Insights and Improvements.
48. Searching for Differential Paths in MD4.
49. Breaking the ICE - Finding Multicollisions in Iterated Concatenated and Expanded (ICE) Hash Functions.
50. Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.