|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 8634 occurrences of 2564 keywords
|
|
|
Results
Found 25080 publication records. Showing 25080 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | Yoshitaka Nagami, Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobayashi |
An Independent Evaluation of Web Timing Attack and its Countermeasure. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Web Timing Attack, Countermeasure, Web Application Security |
23 | Marcel Frigault, Lingyu Wang 0001 |
Measuring Network Security Using Bayesian Network-Based Attack Graphs. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
Security, Network, Measuring, Graph, Attack, Bayesian |
23 | Patrick Bas, Gwenaël J. Doërr |
Evaluation of an optimal watermark tampering attack against dirty paper trellis schemes. |
MM&Sec |
2008 |
DBLP DOI BibTeX RDF |
dirty paper trellis watermarking, security, attack |
23 | Reiner Dojen, Anca Jurcut, Tom Coffey, Cornelia Györödi |
On Establishing and Fixing a Parallel Session Attack in a Security Protocol. |
IDC |
2008 |
DBLP DOI BibTeX RDF |
protocol flaws, parallel session attack, Security protocols |
23 | Amar Aissani |
Queueing Analysis for Networks Under DoS Attack. |
ICCSA (2) |
2008 |
DBLP DOI BibTeX RDF |
Network security, Queueing, Timeout, Steady-state distribution, DoS attack |
23 | Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Deswarte |
Defining categories to select representative attack test-cases. |
QoP |
2007 |
DBLP DOI BibTeX RDF |
classification, evaluation, test, intrusion detection systems, attack |
23 | Su Mon Bo, Hannan Xiao, Aderemi Adereti, James A. Malcolm, Bruce Christianson |
A Performance Comparison of Wireless Ad Hoc Network Routing Protocols under Security Attack. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
routing protocols, wireless ad hoc networks, security attack |
23 | Alexandra Czarlinska, Deepa Kundur |
Attack vs. failure detection in event-driven wireless visual sensor networks. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
wireless visual sensor networks, error detection, attack, event-driven |
23 | Antoine Joux, Thomas Peyrin |
Hash Functions and the (Amplified) Boomerang Attack. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
hash functions, SHA-1, boomerang attack |
23 | Chuan Chi Wang, Min-Chih Kao, Yi-Shiung Yeh |
Forgery attack on the RPC incremental unforgeable encryption scheme. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
incremental encryption, forgery attack |
23 | Soo-Chang Pei, Yi-Chong Zeng |
Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithm. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
attack identification, visual cryptography, semi-fragile watermarking, multiple-watermark, tamper proofing |
23 | Christopher P. Lee 0001, John A. Copeland |
Flowtag: a collaborative attack-analysis, reporting, and sharing tool for security researchers. |
VizSEC |
2006 |
DBLP DOI BibTeX RDF |
network attack analysis, team collaboration, user interfaces, information visualization, tagging, folksonomy, parallel coordinates, honeynet |
23 | Christian Wieschebrink |
An Attack on a Modified Niederreiter Encryption Scheme. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
McEliece encryption, Niederreiter encryption, generalized Reed-Solomon codes, Sidelnikov-Shestakov attack, error-correcting codes, Public key cryptography |
23 | Sanjeev Kumar |
Impact of Distributed Denial of Service (DDoS) Attack Due to ARP Storm. |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
ARP attack, Distributed Denial of Service Attacks, Computer Network Security |
23 | Shih Tsung Liang, Ming-Yi Weng |
Protecting IEEE 802.11 Wireless LANs against the FCS False Blocking Attack. |
ICPADS (1) |
2005 |
DBLP DOI BibTeX RDF |
false blocking attack, FCS false blocking detection and recovery, WLAN, IEEE 802.11, WEP |
23 | Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim 0003, Howon Kim 0001, Kyoil Chung |
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
XTR public key system, XTR Exponentiation Algorithms, Ubiquitous computer, Side Channel Attacks, Collision Attack |
23 | Gregory J. Conti, Kulsoom Abdullah |
Passive visual fingerprinting of network attack tools. |
VizSEC |
2004 |
DBLP DOI BibTeX RDF |
application fingerprinting, network attack visualization, operating system fingerprinting, passive fingerprinting, visual fingerprinting, information visualization |
23 | Hyung-Woo Lee, Taekyoung Kwon 0002, Hyung-Jong Kim 0002 |
NS-2 Based IP Traceback Simulation Against Reflector Based DDoS Attack. |
AIS |
2004 |
DBLP DOI BibTeX RDF |
Reflector Attack, Simulation, DDoS, NS-2, IP Traceback |
23 | Yongdong Wu, Feng Bao 0001 |
Collusion attack on a multi-key secure video proxy scheme. |
ACM Multimedia |
2004 |
DBLP DOI BibTeX RDF |
collusion attack |
23 | Siddika Berna Örs, Frank K. Gürkaynak, Elisabeth Oswald, Bart Preneel |
Power-Analysis Attack on an ASIC AES implementation. |
ITCC (2) |
2004 |
DBLP DOI BibTeX RDF |
AES, power analysis attack |
23 | John Loughran, Tom Dowling |
A Java implemented key collision attack on the data encryption standard (DES). |
PPPJ |
2003 |
DBLP DOI BibTeX RDF |
key collision attack, Java, DES |
23 | Sarbani Palit, Bimal K. Roy, Arindom De |
A Fast Correlation Attack for LFSR-Based Stream Ciphers. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
LFSR polynomial, Correlation immune function, Stream cipher, Correlation attack |
23 | Jan Steffan, Markus Schumacher |
Collaborative attack modeling. |
SAC |
2002 |
DBLP DOI BibTeX RDF |
collaborative knowledge management, security, attack modeling |
23 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
A Low-Complexity and High-Performance Algorithm for the Fast Correlation Attack. |
FSE |
2000 |
DBLP DOI BibTeX RDF |
stream ciphers, decoding, linear feedback shift registers, fast correlation attack, keystream generators |
23 | Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi |
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
authentication protocol specifications, flaws, automatic formal algorithm, protocol roles, intruder communication abilities, intruder computational abilities, protocol instrumentations, formal verification, encryption, message authentication, decryption, attack scenarios, deductive system |
23 | Miodrag J. Mihaljevic |
A Correlation Attack on the Binary Sequence Generators with Time-Varying Output Function. |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
Binary sequence generators, MacLaren-Marsaglia shuffler, Cryptanalysis, Distance measures, Correlation attack |
22 | Qiong Liu, Yupu Hu |
A Fast Correlation Attack via Parallel Computing. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Francesco Buccafurri, Gianluca Caminiti, Gianluca Lax |
Fortifying the dalì attack on digital signature. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
E-signature, digital signature, vulnerability analysis |
22 | Jayashree Padmanabhan, K. S. Easwarakumar |
Traffic Engineering Based Attack Detection in Active Networks. |
ICDCN |
2009 |
DBLP DOI BibTeX RDF |
Denial of Service (DoS), active network, traffic characteristics, leaky buckets |
22 | Neil Hurley, Zunping Cheng, Mi Zhang 0001 |
Statistical attack detection. |
RecSys |
2009 |
DBLP DOI BibTeX RDF |
recommender systems, robustness, collaborative filtering, detection |
22 | Ahren Studer, Adrian Perrig |
The Coremelt Attack. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Finn Michael Halvorsen, Olav Haugen, Martin Eian, Stig Fr. Mjølsnes |
An Improved Attack on TKIP. |
NordSec |
2009 |
DBLP DOI BibTeX RDF |
|
22 | A. Theodore Markettos, Simon W. Moore |
The Frequency Injection Attack on Ring-Oscillator-Based True Random Number Generators. |
CHES |
2009 |
DBLP DOI BibTeX RDF |
|
22 | Vijay Srinivasan, John A. Stankovic, Kamin Whitehouse |
Protecting your daily in-home activity information from a wireless snooping attack. |
UbiComp |
2008 |
DBLP DOI BibTeX RDF |
side channel privacy attacks, wireless fingerprinting, activity monitoring |
22 | Tong-Lee Lim, Tieyan Li |
Exposing an effective denial of information attack from the misuse of EPCglobal standards in an RFID authentication scheme. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Huiming Yu, Xiangfeng Dai, Thomas Baxley, Jinsheng Xu |
A Real-Time Interactive Visualization System for DNS Amplification Attack Challenges. |
ACIS-ICIS |
2008 |
DBLP DOI BibTeX RDF |
interactive visualization, Internet security |
22 | M. Patrick Collins, Michael K. Reiter |
On the Limits of Payload-Oblivious Network Attack Detection. |
RAID |
2008 |
DBLP DOI BibTeX RDF |
evaluation, network intrusion detection, ROC curve |
22 | Sebastiaan Indesteege, Nathan Keller, Orr Dunkelman, Eli Biham, Bart Preneel |
A Practical Attack on KeeLoq. |
EUROCRYPT |
2008 |
DBLP DOI BibTeX RDF |
KeeLoq, cryptanalysis, block ciphers, slide attacks, meet-in-the-middle attacks |
22 | Pierre-Alain Fouque, Reynald Lercier, Denis Réal, Frédéric Valette |
Fault Attack onElliptic Curve Montgomery Ladder Implementation. |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Jörn-Marc Schmidt, Christoph Herbst |
A Practical Fault Attack on Square and Multiply. |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Hongxia Jin, Jeffrey B. Lotspiech, Michael J. Nelson 0002, Nimrod Megiddo |
Adaptive traitor tracing for large anonymous attack. |
Digital Rights Management Workshop |
2008 |
DBLP DOI BibTeX RDF |
security, traitor tracing, content protection |
22 | Muthusrinivasan Muthuprasanna, Govindarasu Manimaran |
Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses. |
ICDCS |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Zhiwen Wang, Qin Xia, Ke Lu, Jie Zhang |
An Approach on Detecting Attack Based on Causality in Network Behavior. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Nan Li, Chunhe Xia, Yi Yang, Haiquan Wang |
An Algorithm for Generation of Attack Signatures Based on Sequences Alignment. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Qinyuan Feng, Yafei Yang, Yan Lindsay Sun, Yafei Dai |
Modeling Attack Behaviors in Rating Systems. |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
22 | Pascal Delaunay, Antoine Joux |
Yet Another Attack on Vest. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
VEST, Stream Ciphers, Side Channel Attacks, Fourier Transform |
22 | Alexandre Berzati, Cécile Canovas, Louis Goubin |
Perturbating RSA Public Keys: An Improved Attack. |
CHES |
2008 |
DBLP DOI BibTeX RDF |
RSA, public key, fault attacks, DFA |
22 | Masashi Une, Akira Otsuka, Hideki Imai |
Wolf Attack Probability: A New Security Measure in Biometric Authentication Systems. |
ICB |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Sushil Jajodia |
Topological analysis of network attack vulnerability. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Shiwei Chen, Chenhui Jin |
An Improved Collision Attack on MD5 Algorithm. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Yoshiyuki Higashi, Kazuo Tanaka, Hiroshi Ohtake, Hua O. Wang |
Construction of simulation model of a flying robot with variable attack angle mechanism. |
IROS |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Mohammad Feroz Raihan, Mohammad Zulkernine |
AsmLSec: An Extension of Abstract State Machine Language for Attack Scenario Specification. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Jomon Aliyas Paul, Govind Hariharan |
Hospital capacity planning for efficient disaster mitigation during a bioterrorist attack. |
WSC |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Alex D. Myasnikov, Alexander Ushakov |
Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Hoang Nguyen, Klara Nahrstedt |
Attack Containment Framework for Large-Scale Critical Infrastructures. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee |
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. |
ICISC |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Hung-Min Sun, Shih-Pu Hsu, Chien-Ming Chen 0001 |
Mobile Jamming Attack and its Countermeasure in Wireless Sensor Networks. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Young June Pyun, Douglas S. Reeves |
Strategic deployment of network monitors for attack attribution. |
BROADNETS |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Thomas Gamer, Michael Scharf, Marcus Schöller |
Collaborative Anomaly-Based Attack Detection. |
IWSOS |
2007 |
DBLP DOI BibTeX RDF |
|
22 | Liying Li, Jianying Zhou 0001, Ning Xiao |
DDoS Attack Detection Algorithms Based on Entropy Computing. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
DDoS detection, entropy computing, network security |
22 | Gaurav Gupta 0002, Josef Pieprzyk |
A Low-Cost Attack on Branch-Based Software Watermarking Schemes. |
IWDW |
2006 |
DBLP DOI BibTeX RDF |
unconditional branch, watermark, software, breakpoint |
22 | Simon P. Chung, Aloysius K. Mok |
Allergy Attack Against Automatic Signature Generation. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
Automatic Signature Generation, Adaptive Response, Intrusion Prevention |
22 | David Duncombe, George M. Mohay, Andrew J. Clark |
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. |
ACSW |
2006 |
DBLP BibTeX RDF |
immunological., intrusion detection, alert correlation |
22 | Ning Liu 0009, K. P. Subbalakshmi |
Worst Case Attack on Quantization Based Data Hiding. |
ISM |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Jinye Peng, GuangQiang He, Jin Xiong, Guihua Zeng |
Trojan Horse Attack Strategy on Quantum Private Communication. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Baocang Wang, Yupu Hu |
Diophantine Approximation Attack on a Fast Public Key Cryptosystem. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Simultaneous Diophantine approximation problem, Cryptanalysis, Public-key cryptosystem, Lattice basis reduction, Diophantine approximation |
22 | Byung Ryong Kim, Ki-Chang Kim |
A Proposal of Extension of FMS-Based Mechanism to Find Attack Paths. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Sushil Jajodia |
Topological analysis of network attack vulnerability. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
22 | James A. Muir |
Seifert's RSA Fault Attack: Simplified Analysis and Generalizations. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
signature verification, fault analysis, RSA signatures, hardware faults |
22 | Kris Tiri, Ingrid Verbauwhede |
A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs. |
DATE |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Ju Liu, Huibo Hu, Jiande Sun 0001, Yu Huang |
A Copy Attack Resilient Blind Watermarking Algorithm Based on Independent Feature Components. |
ISNN (2) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Benjamin W. Long |
Formal Verification of a Type Flaw Attack on a Security Protocol Using Object-Z. |
ZB |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Guido Bertoni, Vittorio Zaccaria, Luca Breveglieri, Matteo Monchiero, Gianluca Palermo |
AES Power Attack Based on Induced Cache Miss and Countermeasure. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
Cache, Block Cipher, AES, Power Analysis, Cache Miss |
22 | Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov |
A Practical Attack on a Braid Group Based Cryptographic Protocol. |
CRYPTO |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Salil S. Kanhere, Anjum Naveed |
A Novel Tuneable Low-Intensity Adversarial Attack. |
LCN |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Adam Stubblefield, John Ioannidis, Aviel D. Rubin |
A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP). |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
wired equivalent privacy, Wireless security |
22 | Alexander Maximov, Thomas Johansson 0001, Steve Babbage |
An Improved Correlation Attack on A5/1. |
Selected Areas in Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Sébastien Kunz-Jacques, Frédéric Muller, Frédéric Valette |
The Davies-Murphy Power Attack. |
ASIACRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
22 | David Mendonça, Earl E. Lee II, William A. Wallace |
Impact of the 2001 World Trade Center attack on critical interdependent infrastructures. |
SMC (5) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Yi-an Huang, Wenke Lee |
Attack Analysis and Detection for Ad Hoc Routing Protocols. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski |
Onions Based on Universal Re-encryption - Anonymous Communication Immune Against Repetitive Attack. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Eun-Kyung Ryu, Kee-Won Kim, Kee-Young Yoo |
An Authenticated Key Agreement Protocol Resistant to a Dictionary Attack. |
ICCSA (4) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Hyung-Woo Lee, Min-goo Kang, Chang-Won Choi |
PTrace: Pushback/SVM Based ICMP Traceback Mechanism against DDoS Attack. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Voravud Santiraveewan, Yongyuth Permpoontanalarp |
A Graph-based Methodology for Analyzing IP Spoofing Attack. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
IP spoofing and Formal Method for Network Security, Network Security, Firewalls |
22 | Hüseyin Demirci, Ali Aydin Selçuk, Erkan Türe |
A New Meet-in-the-Middle Attack on the IDEA Block Cipher. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Tieyan Li, Yongdong Wu |
Trust on Web Browser: Attack vs. Defense. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Katsuyuki Okeya, Dong-Guk Han |
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
Ha-Moons Countermeasure, Finite Markov Chain, Side Channel Attacks, DPA, Elliptic Curve Cryptosystem, SPA |
22 | Geraint Price |
A General Attack Model on Hash-Based Client Puzzles. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng |
An Efficient Known Plaintext Attack on FEA-M. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Yasuo Hatano, Hiroki Sekine, Toshinobu Kaneko |
Higher Order Differential Attack of Camellia (II). |
Selected Areas in Cryptography |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Yongjin Yeom, Sangwoo Park, Iljun Kim |
On the Security of CAMELLIA against the Square Attack. |
FSE |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Steven D. Galbraith, Florian Hess, Nigel P. Smart |
Extending the GHS Weil Descent Attack. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
|
22 | Stefan Mangard |
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
Key Expansion, Smart Cards, AES, Power Analysis, SPA, Key Scheduling |
22 | Kihong Park, Heejo Lee |
On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. |
SIGCOMM |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Yeping He, Sihan Qing |
Square Attack on Reduced Camellia Cipher. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Jovan Dj. Golic, Andrew J. Clark, Ed Dawson |
Generalized Inversion Attack on Nonlinear Filter Generators. |
IEEE Trans. Computers |
2000 |
DBLP DOI BibTeX RDF |
critical branching processes, inversion of finite automata, Boolean functions, Binary trees, keystream generators |
22 | Thomas S. Messerges |
Using Second-Order Power Analysis to Attack DPA Resistant Software. |
CHES |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart Preneel |
Attack on Six Rounds of Crypton. |
FSE |
1999 |
DBLP DOI BibTeX RDF |
|
22 | David A. Wagner 0001 |
The Boomerang Attack. |
FSE |
1999 |
DBLP DOI BibTeX RDF |
|
22 | Wai W. Fung, James W. Gray III |
On m-Permutation Protection Scheme Against Modification Attack. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 25080 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|