50 results on '"Zenner, Erik"'
Search Results
2. Ripple: Overview and Outlook
3. Towards Symbolic Encryption Schemes
4. Cryptanalysis of the Light-Weight Cipher A2U2
5. Cryptanalysis of ARMADILLO2
6. A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
7. Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
8. Cache Timing Analysis of LFSR-Based Stream Ciphers
9. Nonce Generators and the Nonce Reset Problem
10. A Cache Timing Analysis of HC-256
11. 2.3 Autonomieeffekte von Kryptowährungen und Smart Contracts
12. Privacy-Preserving Distributed Economic Dispatch Protocol for Smart Grid
13. The Rabbit Stream Cipher
14. Concrete Security for Entity Recognition: The Jane Doe Protocol
15. Badger – A Fast and Provably Secure MAC
16. Dynamic curricular concepts for research orientated programs in optics and photonics
17. On the Efficiency of the Clock Control Guessing Attack
18. Improved Cryptanalysis of the Self-Shrinking Generator
19. Ripple: Overview and Outlook
20. The suffix-free-prefix-free hash function construction and its indifferentiability security analysis
21. Das eStream-Projekt: Oder: Die Wiederentdeckung der Stromchiffre
22. Towards Symbolic Encryption Schemes
23. Differential Cryptanalysis of Round-Reduced PRINTcipher: Computing Roots of Permutations
24. Cryptanalysis of the Light-Weight Cipher A2U2
25. A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
26. A Cache Timing Analysis of HC-256
27. Cache Timing Analysis of LFSR-Based Stream Ciphers
28. Concrete Security for Entity Recognition: The Jane Doe Protocol
29. Badger – A Fast and Provably Secure MAC
30. Dynamic curricular concepts for research orientated programs in optics and photonics
31. Improved Cryptanalysis of the Self-Shrinking Generator
32. Analysis of the End-by-Hop Protocol for Secure Aggregation in Sensor Networks
33. Cache Timing Analysis of eStream Finalists
34. Why IV Setup for Stream Ciphers is Difficult
35. On the Role of the Inner State Size in Stream Ciphers
36. On Cryptographic Properties of LFSR-based Pseudorandom Generators
37. Cryptanalysis of LFSR-based Pseudorandom Generators - a Survey
38. The Rabbit Stream Cipher
39. Zenner, Erik
40. Cryptanalysis of ARMADILLO2
41. Improved Software Implementation of DES Using CUDA and OpenCL
42. Cryptanalysis of the Light-Weight Cipher A2U2
43. Fast high-performance modeling tools for many-core architectures
44. Why IV Setup for Stream Ciphers is Difficult
45. Protecting Online Transactions with Unique Embedded Key Generators
46. Dynamic curricular concepts for research orientated programs in optics and photonics.
47. Protecting Online Transactions with Unique Embedded Key Generators
48. Network Security
49. Badger - A Fast and Provably Secure MAC.
50. Das eStream-Projekt.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.