Search

Your search keyword '"Bogdanov, Andrey"' showing total 55 results

Search Constraints

Start Over You searched for: Author "Bogdanov, Andrey" Remove constraint Author: "Bogdanov, Andrey" Publisher springer nature Remove constraint Publisher: springer nature
55 results on '"Bogdanov, Andrey"'

Search Results

1. The COLM Authenticated Encryption Scheme.

2. Troika: a ternary cryptographic hash function.

3. Compact circuits for combined AES encryption/decryption.

27. Towards the optimality of Feistel ciphers with substitution-permutation functions.

37. Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs.

38. Trusted Computing für automobile IT-Systeme.

39. Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection.

40. Hash Functions and RFID Tags: Mind the Gap.

41. Time-Area Optimized Public-Key Engines: $\MATHCAL{MQ}$ -Cryptosystems as Replacement for Elliptic Curves?

42. Multiple-Differential Side-Channel Collision Attacks on AES.

43. Linear Slide Attacks on the KeeLoq Block Cipher.

44. A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations.

45. Collision Attacks on AES-Based MAC: Alpha-MAC.

46. Improved Side-Channel Collision Attacks on AES.

47. Linear hulls with correlation zero and linear cryptanalysis of block ciphers.

48. Generalized Feistel networks revisited.

49. On security arguments of the second round SHA-3 candidates.

50. On unbalanced Feistel networks with contracting MDS diffusion.

Catalog

Books, media, physical & digital resources