Search

Your search keyword '"Zenner, Erik"' showing total 50 results

Search Constraints

Start Over You searched for: Author "Zenner, Erik" Remove constraint Author: "Zenner, Erik"
50 results on '"Zenner, Erik"'

Search Results

1. Privacy-Preserving Distributed Economic Dispatch Protocol for Smart Grid

2. Ripple: Overview and Outlook

3. Towards Symbolic Encryption Schemes

4. Cryptanalysis of the Light-Weight Cipher A2U2

5. Cryptanalysis of ARMADILLO2

6. A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack

7. Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations

8. Cache Timing Analysis of LFSR-Based Stream Ciphers

9. Nonce Generators and the Nonce Reset Problem

10. A Cache Timing Analysis of HC-256

13. The Rabbit Stream Cipher

14. Concrete Security for Entity Recognition: The Jane Doe Protocol

15. Badger – A Fast and Provably Secure MAC

19. Ripple: Overview and Outlook

32. Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks

33. Cache Timing Analysis of eStream Finalists

34. Why IV Setup for Stream Ciphers is Difficult

35. On the Role of the Inner State Size in Stream Ciphers

36. On Cryptographic Properties of LFSR-based Pseudorandom Generators

37. Cryptanalysis of LFSR-based Pseudorandom Generators - a Survey

39. Zenner, Erik

40. Cryptanalysis of ARMADILLO2

42. Cryptanalysis of the Light-Weight Cipher A2U2

43. Fast high-performance modeling tools for many-core architectures

44. Why IV Setup for Stream Ciphers is Difficult

45. Protecting Online Transactions with Unique Embedded Key Generators

48. Network Security

49. Badger - A Fast and Provably Secure MAC.

50. Das eStream-Projekt.

Catalog

Books, media, physical & digital resources