History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 | next | last

Result 1 to 20 of 20 total

Sakura: a flexible coding for tree hashing. (English)
Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10‒13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 217-234 (2014).
WorldCat.org
1
Sufficient conditions for sound tree and sequential hashing modes. (English)
Int. J. Inf. Sec.Int. J. Inf. Sec. 13, N0. 4, 335-353(2014)
WorldCat.org
2
The Making of KECCAK. (English)
CryptologiaCryptologia 38, N0. 1, 26-60(2014)
WorldCat.org
3
Keccak. (English)
Johansson, Thomas (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26‒30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 313-314 (2013).
WorldCat.org
4
Compact implementation and performance evaluation of hash functions in attiny devices. (English)
Mangard, Stefan (ed.), Smart card research and advanced applications. 11th international conference, CARDIS 2012, Graz, Austria, November 28‒30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37287-2/pbk). Lecture Notes in Computer Science 7771, 158-172 (2013).
WorldCat.org
5
Efficient and First-Order DPA Resistant Implementations of Keccak. (English)
CARDIS, 187-199(2013)
WorldCat.org
6
Differential propagation analysis of Keccak. (English)
Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19‒21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 422-441 (2012).
WorldCat.org
7
Quantum cryptography and secret-key distillation. Reprint of the 2006 hardback ed. (English)
Cambridge: Cambridge University Press (ISBN 978-1-107-41063-3/pbk; 978-0-511-61774-4/ebook). xiii, 261~p. \sterling~37.99/pbk (2012).
WorldCat.org
8
Duplexing the sponge: Single-pass authenticated encryption and other applications. (English)
Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11‒12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 320-337 (2012).
WorldCat.org
9
Power analysis of hardware implementations protected with secret sharing. (English)
MICRO Workshops, 9-16(2012)
WorldCat.org
10
Sponge-based pseudo-random number generators. (English)
Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2010. 12th international workshop, Santa Barbara, USA, August 17‒20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 33-47 (2010).
WorldCat.org
11
On the indifferentiability of the sponge construction. (English)
Smart, Nigel (ed.), Advances in cryptology ‒ EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13‒17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 181-197 (2008).
WorldCat.org
12
Producing collisions for Panama, instantaneously. (English)
Biryukov, Alex (ed.), Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26‒28, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74617-1/pbk). Lecture Notes in Computer Science 4593, 1-18 (2007).
WorldCat.org
13
Distinguishing stream ciphers with convolutional filters. (English)
De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6‒8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 257-270 (2006).
WorldCat.org
14
Quantum cryptography and secret-key distillation. (English)
Cambridge: Cambridge University Press (ISBN 0-521-86485-2/hbk). xiii, 261~p. \sterling~45.00; \$~80.00 (2006).
WorldCat.org
15
Reconciliation of a quantum-distributed Gaussian key. (English)
IEEE Trans. Inf. Theory 50, No. 2, 394-400 (2004).
WorldCat.org
16
Side-information coding with turbo codes and its application to quantum key distribution. (English)
Comput. Res. Repos. 2004, Article No. 0406001 (2004).
WorldCat.org
17
Reconciliation of a quantum-distributed Gaussian key. (English)
Comput. Res. Repos. 2001, Article No. 0107030 (2001).
WorldCat.org
18
Bitslice ciphers and power analysis attacks. (English)
Schneier, Bruce (ed.), Fast software encryption. 7th international workshop, FSE 2000, New York, NY, USA, April 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1978, 134-149 (2001).
WorldCat.org
19
OPTKIN - mechanistic modeling by kinetic and thermodynamic parameter optimization. (English)
Comput. Chem. 22, No. 5, 413-417 (1998).
Classification: J.2 K.8.1
WorldCat.org
20
first | previous | 1 | next | last

Result 1 to 20 of 20 total

Valid XHTML 1.0 Transitional Valid CSS!