History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 121 total

Multilinear maps from obfuscation. (English)
Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10‒13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 446-473 (2016).
WorldCat.org
1
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results. (English)
CRYPTO (1), 403-432(2016)
WorldCat.org
2
Lucky Microseconds: A Timing Attack on Amazon’s s2n Implementation of TLS. (English)
EUROCRYPT (1), 622-643(2016)
WorldCat.org
3
Security against related randomness attacks via reconstructive extractors. (English)
Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15‒17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 23-40 (2015).
WorldCat.org
4
Data is a stream: security of stream-based channels. (English)
Gennaro, Rosario (ed.) et al., Advances in cryptology ‒ CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16‒20, 2015. Proceedings. Part II. Berlin, Heidelberg: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 545-564 (2015).
WorldCat.org
5
Plaintext recovery attacks against WPA/TKIP. (English)
Cid, Carlos (ed.) et al., Fast software encryption. 21st international workshop, FSE 2014, London, UK, March 3‒5, 2014. Revised selected papers. Berlin: Springer (ISBN 978-3-662-46705-3/pbk; 978-3-662-46706-0/ebook). Lecture Notes in Computer Science 8540, 325-349 (2015).
WorldCat.org
6
Simulation-based selective opening CCA security for PKE from key encapsulation mechanisms. (English)
Katz, Jonathan (ed.), Public-key cryptography ‒ PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 ‒ April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 3-26 (2015).
WorldCat.org
7
A Practical Attack Against the Use of RC4 in the HIVE Hidden Volume Encryption System. (English)
ASIACCS, 475-482(2015)
WorldCat.org
8
Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS. (English)
USENIX Security Symposium, 113-128(2015)
WorldCat.org
9
Unpicking PLAID. (English)
Chen, Liqun (ed.) et al., Security standardisation research. First international conference, SSR 2014, London, UK, December 16‒17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-14053-7/hbk). Lecture Notes in Computer Science 8893, 1-25 (2014).
WorldCat.org
10
On symmetric encryption with distinguishable decryption failures. (English)
Moriai, Shiho (ed.), Fast software encryption. 20th international workshop, FSE 2013, Washington, DC, USA, March 11‒13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-662-43932-6/pbk; 978-3-662-43933-3/ebook). Lecture Notes in Computer Science 8424, 367-390 (2014).
WorldCat.org
11
Big bias hunting in Amazonia: large-scale computation and exploitation of RC4 biases (invited paper). (English)
Sarkar, Palash (ed.) et al., Advances in cryptology ‒ ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7‒11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 398-419 (2014).
WorldCat.org
12
Related-key security for pseudorandom functions beyond the linear barrier. (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 77-94 (2014).
WorldCat.org
13
Security of symmetric encryption against mass surveillance. (English)
Garay, Juan A. (ed.) et al., Advances in cryptology ‒ CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 1-19 (2014).
WorldCat.org
14
Related randomness attacks for public key encryption. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 465-482 (2014).
WorldCat.org
15
Development of an active powered biped lower limb exoskeleton. (English)
CASE, 990-995(2014)
WorldCat.org
16
ASICS: Authenticated key exchange security incorporating certification systems. (English)
Crampton, Jason (ed.) et al., Computer security ‒ ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9‒13, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40202-9/pbk). Lecture Notes in Computer Science 8134, 381-399 (2013).
WorldCat.org
17
Signal-flow-based analysis of wireless security protocols. (English)
Inf. Comput. 226, 37-56 (2013).
WorldCat.org
18
Programmable hash functions in the multilinear setting. (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 513-530 (2013).
WorldCat.org
19
On the security of the TLS protocol: a systematic analysis. (English)
Canetti, Ran (ed.) et al., Advances in cryptology ‒ CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18‒22, 2013. Proceedings, Part I. Berlin: Springer (ISBN 978-3-642-40040-7/pbk). Lecture Notes in Computer Science 8042, 429-448 (2013).
WorldCat.org
20
first | previous | 1 21 41 61 81 101 | next | last

Result 1 to 20 of 121 total

Valid XHTML 1.0 Transitional Valid CSS!