Font Size: a A A
Keyword [Key-Recovery Attack]
Result: 1 - 11 | Page: 1 of 1
1. Distinguishing Attack On LPMAC Instantiated With Reduced SHA-1 And Partial Key Recovery Attack On SHA-0-MAC
2. Distinguishing Attacks On LPMAC Instantiated With Reduced SHA-1 And Partial Key Recovery Attacks On 53-step SHA-1-MAC
3. Research On The Securlty Of The H~2-MAC Instantlated With SHA-1
4. Security Analysis Of Block Ciphers And Stream Ciphers
5. Cryptanalysis Of Authenticated Ciphers
6. Research On Security Of Ultra Lightweight RFID Authentication Protocol
7. Differential Analysis Of Lightweight Block Cipher GIFT
8. New Techniques For Symmetric-key Cryptanalysis
9. Cryptanalysis For Lightweight Cryptographic Algorithms
10. Research On Public Key Cryptography Based On Quasi-cyclic Parity Check Code
11. Coefficient Properties Of The MixColumns Matrix And Its Influence On The Security Of AES
  <<First  <Prev  Next>  Last>>  Jump to