Search

Your search keyword '"Ankele, Ralph"' showing total 18 results

Search Constraints

Start Over You searched for: Author "Ankele, Ralph" Remove constraint Author: "Ankele, Ralph"
18 results on '"Ankele, Ralph"'

Search Results

1. The Boomerang protocol: A Decentralised Privacy-Preserving Verifiable Incentive Protocol

2. Requirements and Recommendations for IoT/IIoT Models to automate Security Assurance through Threat Modelling, Security Analysis and Penetration Testing

3. Analysis of lightweight and efficient symmetric-key primitives

4. Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

5. Differential Cryptanalysis of Round-Reduced Sparx-64/128

6. MergeMAC: A MAC for Authentication with Strict Time Constraints and Limited Bandwidth

7. Related-Key Impossible-Differential Attack on Reduced-Round Skinny

9. State-Recovery Analysis of Spritz

14. Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion

15. Mind the Gap - A Closer Look at the Security of Block Ciphers against Differential Cryptanalysis

17. Software Benchmarking of the 2nd round CAESAR Candidates

Catalog

Books, media, physical & digital resources