History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 21 total

Investigation of self-healing compliant actuators for robotics. (English)
ICRA, 258-263(2015)
WorldCat.org
1
Sakura: a flexible coding for tree hashing. (English)
Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10‒13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 217-234 (2014).
WorldCat.org
2
The Making of KECCAK. (English)
CryptologiaCryptologia 38, N0. 1, 26-60(2014)
WorldCat.org
3
Sufficient conditions for sound tree and sequential hashing modes. (English)
Int. J. Inf. Sec.Int. J. Inf. Sec. 13, N0. 4, 335-353(2014)
WorldCat.org
4
Compact implementation and performance evaluation of hash functions in attiny devices. (English)
Mangard, Stefan (ed.), Smart card research and advanced applications. 11th international conference, CARDIS 2012, Graz, Austria, November 28‒30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37287-2/pbk). Lecture Notes in Computer Science 7771, 158-172 (2013).
WorldCat.org
5
Keccak. (English)
Johansson, Thomas (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26‒30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 313-314 (2013).
WorldCat.org
6
Efficient and First-Order DPA Resistant Implementations of Keccak. (English)
CARDIS, 187-199(2013)
WorldCat.org
7
Differential propagation analysis of Keccak. (English)
Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19‒21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 422-441 (2012).
WorldCat.org
8
Quantum cryptography and secret-key distillation. Reprint of the 2006 hardback ed. (English)
Cambridge: Cambridge University Press (ISBN 978-1-107-41063-3/pbk; 978-0-511-61774-4/ebook). xiii, 261~p. \sterling~37.99/pbk (2012).
WorldCat.org
9
Duplexing the sponge: Single-pass authenticated encryption and other applications. (English)
Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11‒12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 320-337 (2012).
WorldCat.org
10
Power analysis of hardware implementations protected with secret sharing. (English)
MICRO Workshops, 9-16(2012)
WorldCat.org
11
Sponge-based pseudo-random number generators. (English)
Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2010. 12th international workshop, Santa Barbara, USA, August 17‒20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 33-47 (2010).
WorldCat.org
12
On the indifferentiability of the sponge construction. (English)
Smart, Nigel (ed.), Advances in cryptology ‒ EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13‒17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 181-197 (2008).
WorldCat.org
13
Producing collisions for Panama, instantaneously. (English)
Biryukov, Alex (ed.), Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26‒28, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74617-1/pbk). Lecture Notes in Computer Science 4593, 1-18 (2007).
WorldCat.org
14
Distinguishing stream ciphers with convolutional filters. (English)
De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6‒8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 257-270 (2006).
WorldCat.org
15
Quantum cryptography and secret-key distillation. (English)
Cambridge: Cambridge University Press (ISBN 0-521-86485-2/hbk). xiii, 261~p. \sterling~45.00; \$~80.00 (2006).
WorldCat.org
16
Reconciliation of a quantum-distributed Gaussian key. (English)
IEEE Trans. Inf. Theory 50, No. 2, 394-400 (2004).
WorldCat.org
17
Side-information coding with turbo codes and its application to quantum key distribution. (English)
Comput. Res. Repos. 2004, Article No. 0406001 (2004).
WorldCat.org
18
Reconciliation of a quantum-distributed Gaussian key. (English)
Comput. Res. Repos. 2001, Article No. 0107030 (2001).
WorldCat.org
19
Bitslice ciphers and power analysis attacks. (English)
Schneier, Bruce (ed.), Fast software encryption. 7th international workshop, FSE 2000, New York, NY, USA, April 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1978, 134-149 (2001).
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 21 total

Valid XHTML 1.0 Transitional Valid CSS!