325 results on '"Robshaw, Matthew"'
Search Results
2. Differential Cryptanalysis: The Idea
3. Advanced Topics
4. Brute Force Attacks
5. Linear Cryptanalysis: The Idea
6. AES
7. Using Block Ciphers
8. DES
9. Introduction
10. The eSTREAM Project
11. On Related-Key Attacks and KASUMI: The Case of A5/3
12. PRINTcipher: A Block Cipher for IC-Printing
13. On Unbiased Linear Approximations
14. How to Encrypt with the LPN Problem
15. Looking Back at a New Hash Function
16. Good Variants of HB + Are Hard to Find
17. [Untitled]
18. Securing RSA-KEM via the AES
19. Ten Years of Information Security Masters Programmes : Reflections and New Challenges
20. Essential Algebraic Structure within the AES
21. Analysis of SHA-1 in Encryption Mode
22. On the Design and Security of RC2
23. Trapdoor One-Way Function
24. One-Way Function
25. The Block Cipher Companion
26. PRINTcipher: A Block Cipher for IC-Printing
27. On Unbiased Linear Approximations
28. An overview of RFID tags and new cryptographic developments
29. Good Variants of HB + Are Hard to Find
30. Securing RSA-KEM via the AES
31. Ten Years of Information Security Masters Programmes
32. Essential Algebraic Structure within the AES
33. Analysis of SHA-1 in Encryption Mode
34. On the Design and Security of RC2
35. How to Encrypt with the LPN Problem
36. : Increasing the Security and Efficiency of
37. Looking Back at a New Hash Function
38. Lightweight Cryptography and RFID: Tackling the Hidden Overhead
39. : Increasing the Security and Efficiency of.
40. Distinguishing Attacks on the Stream Cipher Py.
41. Resynchronization Attacks on WG and LEX.
42. Upper Bounds on Algebraic Immunity of Boolean Power Functions.
43. Chosen-Ciphertext Attacks Against MOSQUITO.
44. How Far Can We Go on the x64 Processors?
45. Computing the Algebraic Immunity Efficiently.
46. The Impact of Carries on the Complexity of Collision Attacks on SHA-1.
47. The Ideal-Cipher Model, Revisited: An Uninstantiable Blockcipher-Based Hash Function.
48. A New Mode of Encryption Providing a Tweakable Strong Pseudo-random Permutation.
49. New Blockcipher Modes of Operation with Beyond the Birthday Bound Security.
50. A Study of the MD5 Attacks: Insights and Improvements.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.