History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 23 total

Toward Self-Healing Actuators: A Preliminary Concept. (English)
IEEE Trans. Robotics 32, N0. 3, 736-743(2016)
WorldCat.org
1
Security of keyed sponge constructions using a modular proof approach. (English)
Leander, Gregor (ed.), Fast software encryption. 22nd international workshop, FSE 2015, Istanbul, Turkey, March 8‒11, 2015. Revised selected papers. Berlin: Springer (ISBN 978-3-662-48115-8/pbk; 978-3-662-48116-5/ebook). Lecture Notes in Computer Science 9054, 364-384 (2015).
WorldCat.org
2
Investigation of self-healing compliant actuators for robotics. (English)
ICRA, 258-263(2015)
WorldCat.org
3
Sakura: a flexible coding for tree hashing. (English)
Boureanu, Ioana (ed.) et al., Applied cryptography and network security. 12th international conference, ACNS 2014, Lausanne, Switzerland, June 10‒13, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-07535-8/pbk). Lecture Notes in Computer Science 8479, 217-234 (2014).
WorldCat.org
4
Sufficient conditions for sound tree and sequential hashing modes. (English)
Int. J. Inf. Sec. 13, N0. 4, 335-353(2014)
WorldCat.org
5
The Making of KECCAK. (English)
Cryptologia 38, N0. 1, 26-60(2014)
WorldCat.org
6
Compact implementation and performance evaluation of hash functions in attiny devices. (English)
Mangard, Stefan (ed.), Smart card research and advanced applications. 11th international conference, CARDIS 2012, Graz, Austria, November 28‒30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-37287-2/pbk). Lecture Notes in Computer Science 7771, 158-172 (2013).
WorldCat.org
7
Keccak. (English)
Johansson, Thomas (ed.) et al., Advances in cryptology ‒ EUROCRYPT 2013. 32nd annual international conference on the theory and applications of cryptographic techniques, Athens, Greece, May 26‒30, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-38347-2/pbk). Lecture Notes in Computer Science 7881, 313-314 (2013).
WorldCat.org
8
Efficient and First-Order DPA Resistant Implementations of Keccak. (English)
CARDIS, 187-199(2013)
WorldCat.org
9
Differential propagation analysis of Keccak. (English)
Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19‒21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 422-441 (2012).
WorldCat.org
10
Quantum cryptography and secret-key distillation. Reprint of the 2006 hardback ed. (English)
Cambridge: Cambridge University Press (ISBN 978-1-107-41063-3/pbk; 978-0-511-61774-4/ebook). xiii, 261~p. (2012).
WorldCat.org
11
Duplexing the sponge: Single-pass authenticated encryption and other applications. (English)
Miri, Ali (ed.) et al., Selected areas in cryptography. 18th international workshop, SAC 2011, Toronto, ON, Canada, August 11‒12, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-28495-3/pbk). Lecture Notes in Computer Science 7118, 320-337 (2012).
WorldCat.org
12
Power analysis of hardware implementations protected with secret sharing. (English)
MICRO Workshops, 9-16(2012)
WorldCat.org
13
Sponge-based pseudo-random number generators. (English)
Mangard, Stefan (ed.) et al., Cryptographic hardware and embedded systems ‒ CHES 2010. 12th international workshop, Santa Barbara, USA, August 17‒20, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15030-2/pbk). Lecture Notes in Computer Science 6225, 33-47 (2010).
WorldCat.org
14
On the indifferentiability of the sponge construction. (English)
Smart, Nigel (ed.), Advances in cryptology ‒ EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13‒17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 181-197 (2008).
WorldCat.org
15
Producing collisions for Panama, instantaneously. (English)
Biryukov, Alex (ed.), Fast software encryption. 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26‒28, 2007. Revised selected papers. Berlin: Springer (ISBN 978-3-540-74617-1/pbk). Lecture Notes in Computer Science 4593, 1-18 (2007).
WorldCat.org
16
Distinguishing stream ciphers with convolutional filters. (English)
De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6‒8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 257-270 (2006).
WorldCat.org
17
Quantum cryptography and secret-key distillation. (English)
Cambridge: Cambridge University Press (ISBN 0-521-86485-2/hbk). xiii, 261~p. (2006).
WorldCat.org
18
Reconciliation of a quantum-distributed Gaussian key. (English)
IEEE Trans. Inf. Theory 50, No. 2, 394-400 (2004).
WorldCat.org
19
Side-information coding with turbo codes and its application to quantum key distribution. (English)
Comput. Res. Repos. 2004, Article No. 0406001 (2004).
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 23 total

Valid XHTML 1.0 Transitional Valid CSS!