22 results on '"Zenner, Erik"'
Search Results
2. Cryptanalysis of the Light-Weight Cipher A2U2
3. Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks
4. Cache Timing Analysis of eStream Finalists
5. Why IV Setup for Stream Ciphers is Difficult
6. On the Role of the Inner State Size in Stream Ciphers
7. On Cryptographic Properties of LFSR-based Pseudorandom Generators
8. Cryptanalysis of LFSR-based Pseudorandom Generators - a Survey
9. Ripple: Overview and Outlook.
10. Dynamic curricular concepts for research orientated programs in optics and photonics.
11. Towards Symbolic Encryption Schemes.
12. Cryptanalysis of ARMADILLO2.
13. A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack.
14. Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations.
15. Nonce Generators and the Nonce Reset Problem.
16. A Cache Timing Analysis of HC-256.
17. Cache Timing Analysis of LFSR-Based Stream Ciphers.
18. Concrete Security for Entity Recognition: The Jane Doe Protocol.
19. The Rabbit Stream Cipher.
20. Protecting Online Transactions with Unique Embedded Key Generators.
21. Badger - A Fast and Provably Secure MAC.
22. Improved Cryptanalysis of the Self-Shrinking Generator.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.