Search

Your search keyword '"Robshaw, Matthew"' showing total 325 results

Search Constraints

Start Over You searched for: Author "Robshaw, Matthew" Remove constraint Author: "Robshaw, Matthew"
325 results on '"Robshaw, Matthew"'

Search Results

6. AES

8. DES

9. Introduction

10. The eSTREAM Project

11. On Related-Key Attacks and KASUMI: The Case of A5/3

12. PRINTcipher: A Block Cipher for IC-Printing

13. On Unbiased Linear Approximations

14. How to Encrypt with the LPN Problem

15. Looking Back at a New Hash Function

16. Good Variants of HB + Are Hard to Find

17. [Untitled]

18. Securing RSA-KEM via the AES

22. On the Design and Security of RC2

39. : Increasing the Security and Efficiency of.

40. Distinguishing Attacks on the Stream Cipher Py.

41. Resynchronization Attacks on WG and LEX.

42. Upper Bounds on Algebraic Immunity of Boolean Power Functions.

43. Chosen-Ciphertext Attacks Against MOSQUITO.

44. How Far Can We Go on the x64 Processors?

45. Computing the Algebraic Immunity Efficiently.

46. The Impact of Carries on the Complexity of Collision Attacks on SHA-1.

47. The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function.

48. A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation.

49. New Blockcipher Modes of Operation with Beyond the Birthday Bound Security.

50. A Study of the MD5 Attacks: Insights and Improvements.

Catalog

Books, media, physical & digital resources