Search

Your search keyword '"Bogdanov, Andrey"' showing total 766 results

Search Constraints

Start Over You searched for: Author "Bogdanov, Andrey" Remove constraint Author: "Bogdanov, Andrey"
766 results on '"Bogdanov, Andrey"'

Search Results

104. How to Securely Release Unverified Plaintext in Authenticated Encryption

105. Towards Understanding the Known-Key Security of Block Ciphers

106. ALE: AES-Based Lightweight Authenticated Encryption

107. On the Wrong Key Randomisation and Key Equivalence Hypotheses in Matsui’s Algorithm 2

108. Zero-Correlation Linear Cryptanalysis with FFT and Improved Attacks on ISO Standards Camellia and CLEFIA

109. General Application of FFT in Cryptanalysis and Improved Attack on CAST-256

110. Route 66: Passively Breaking All GSM Channels

111. On the (In)Equivalence of Impossible Differential and Zero-Correlation Distinguishers for Feistel- and Skipjack-Type Ciphers

112. Multidimensional Zero-Correlation Linear Cryptanalysis of E2

113. Application of BIM-technologies during the construction and operation of buildings and structures

114. The use of nanosized additives in the modification of brick loam

117. To hundred anniversary of Gorimir Gorimirovich Cherny

118. Indirect bandgap MoSe2 resonators for light-emitting nanophotonics

123. Bound states in the continuum in photonic structures

124. Parallelizable and Authenticated Online Ciphers

125. Key Difference Invariant Bias in Block Ciphers

126. Fides: Lightweight Authenticated Cipher with Side-Channel Resistance for Constrained Hardware

127. On the Indifferentiability of Key-Alternating Ciphers

128. Bounds in Shallows and in Miseries

129. Improved Impossible Differential Attacks on Large-Block Rijndael

130. Integral and Multidimensional Linear Distinguishers with Correlation Zero

131. Zero Correlation Linear Cryptanalysis with Reduced Data Complexity

132. Key-Alternating Ciphers in a Provable Setting: Encryption Using a Small Number of Public Permutations : (Extended Abstract)

133. Biclique Cryptanalysis of the Full AES

134. spongent: A Lightweight Hash Function

135. Double SP-Functions: Enhanced Generalized Feistel Networks : Extended Abstract

136. A 3-Subset Meet-in-the-Middle Attack: Cryptanalysis of the Lightweight Block Cipher KTANTAN

140. Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs

142. Algebraic Methods in Side-Channel Collision Attacks and Practical Collision Detection

143. Hash Functions and RFID Tags: Mind the Gap

144. Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves?

145. Multiple-Differential Side-Channel Collision Attacks on AES

146. Linear Slide Attacks on the KeeLoq Block Cipher

149. Collision Attacks on AES-Based MAC: Alpha-MAC

150. A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations

Catalog

Books, media, physical & digital resources