Search

Your search keyword '"Jacobson JR"' showing total 50 results

Search Constraints

Start Over You searched for: Author "Jacobson JR" Remove constraint Author: "Jacobson JR" Publisher springer international publishing Remove constraint Publisher: springer international publishing
50 results on '"Jacobson JR"'

Search Results

2. High-Throughput Elliptic Curve Cryptography Using AVX2 Vector Instructions

3. Protecting the Privacy of Voters: New Definitions of Ballot Secrecy for E-Voting

4. Practical Isogeny-Based Key-Exchange with Optimal Tightness

5. On Self-equivalence Encodings in White-Box Implementations

6. PRINCEv2 : More Security for (Almost) No Overhead

7. Low-Gate Quantum Golden Collision Finding

8. Not Enough LESS: An Improved Algorithm for Solving Code Equivalence Problems over

9. On the Influence of Optimizers in Deep Learning-Based Side-Channel Analysis

10. Nonce-Misuse Security of the SAEF Authenticated Encryption Mode

11. Towards Post-Quantum Security for Signal’s X3DH Handshake

12. WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher

13. Subsampling and Knowledge Distillation on Adversarial Examples: New Techniques for Deep Learning Based Side Channel Evaluations

14. Correlation Power Analysis and Higher-Order Masking Implementation of WAGE

15. Trapdoor DDH Groups from Pairings and Isogenies

16. Boolean Polynomials, BDDs and CRHS Equations - Connecting the Dots with CryptaPath

17. Improvements to Quantum Search Techniques for Block-Ciphers, with Applications to AES

18. Improved (Related-key) Differential Cryptanalysis on GIFT

19. Algebraic Key-Recovery Attacks on Reduced-Round Xoofff

20. On Index Calculus Algorithms for Subfield Curves

21. Weak-Key Distinguishers for AES

22. Boolean Ring Cryptographic Equation Solving

23. Unintended Features of APIs: Cryptanalysis of Incremental HMAC

24. Obfuscating Finite Automata

25. FROST: Flexible Round-Optimized Schnorr Threshold Signatures

26. Interpolation Cryptanalysis of Unbalanced Feistel Networks with Low Degree Round Functions

27. Algorithmic Acceleration of B/FV-Like Somewhat Homomorphic Encryption for Compute-Enabled RAM

28. Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments

29. Unsupervised Machine Learning on Encrypted Data

30. Profiled Power Analysis Attacks Using Convolutional Neural Networks with Domain Knowledge

31. A Full RNS Variant of Approximate Homomorphic Encryption

32. Fault Attacks on Nonce-Based Authenticated Encryption: Application to Keyak and Ketje

33. Injective Encodings to Binary Ordinary Elliptic Curves

34. A Generalized Attack on Some Variants of the RSA Cryptosystem

35. Provably Secure NTRUEncrypt over Any Cyclotomic Field

36. On the Cost of Computing Isogenies Between Supersingular Elliptic Curves

37. Analysis of Error-Correcting Codes for Lattice-Based Key Exchange

38. EFLASH: A New Multivariate Encryption Scheme

39. Public Key Compression for Constrained Linear Signature Schemes

40. Sliding-Window Correlation Attacks Against Encryption Devices with an Unstable Clock

41. Cache-Attacks on the ARM TrustZone Implementations of AES-256 and AES-256-GCM via GPU-Based Analysis

42. Assessing the Feasibility of Single Trace Power Analysis of Frodo

43. Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

44. Finding Integral Distinguishers with Ease

45. Towards Key-Dependent Integral and Impossible Differential Distinguishers on 5-Round AES

46. Analysis and Improvement of an Authentication Scheme in Incremental Cryptography

47. Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes

48. Integral Attacks on Round-Reduced Bel-T-256

49. Variants of the AES Key Schedule for Better Truncated Differential Bounds

50. Targeted Ciphers for Format-Preserving Encryption

Catalog

Books, media, physical & digital resources