Font Size: a A A
Keyword [Key Recovery]
Result: 1 - 20 | Page: 1 of 2
1. Distinguishing Attack On LPMAC Instantiated With Reduced SHA-1 And Partial Key Recovery Attack On SHA-0-MAC
2. Research On Key Technologies Of E-government Security Engineering
3. Key Recovery Schemes Of Protocols Based On Subliminal Channel
4. Escrow Mechanism For Personal Security Keys On IBE
5. Research On Key Recovery System Based On Distributed Computing
6. Distinguishing Attacks On LPMAC Instantiated With Reduced SHA-1 And Partial Key Recovery Attacks On 53-step SHA-1-MAC
7. Research On Model Of Full Disk Encryption Based On Trusted Virtual Machine
8. Research On The Securlty Of The H~2-MAC Instantlated With SHA-1
9. Design And Implementation Of Emergency Handling And Graded Response System For Mobile Local Network
10. The Study Of Extracting Attack On Image Steganography And Reversible Data Hiding In Encrypted Images
11. Research And Implementation Of "One-Key Recovery" Technology Of Sensor Nodes In WSN
12. Cryptanalysis On Some Symmetric Encryption Algorithms
13. Research On Outsourcing Storage Data Integrity Audit In Cloud Computing
14. Security Analysis Of Block Ciphers And Stream Ciphers
15. New Conditional Cube Attacks On Sponge(-Like)Cryptographic Algorithms
16. Cryptanalysis Of Authenticated Ciphers
17. Cryptanalysis Of Several Classic Structures For Symmetric Ciphers
18. The Improved Differential Cryptanalysis Of MANTIS
19. A Research On Secure Coding Technology Of Centralized Digital Currency
20. Research On Security Of Ultra Lightweight RFID Authentication Protocol
  <<First  <Prev  Next>  Last>>  Jump to